Edenhouse Solutions

SAP Business One (B1) Cloud Implementation & Migration

SAP Business One offers full ERP capability for small to medium sized organisations. Deployed in the cloud with Edenhouse's full managed support service, Business One offers excellent time-to-value to clients. Full implementation service is also available from Edenhouse Solutions.


  • Multiple hosting options - on premise or cloud
  • UK based support
  • Cost effective, expert B1 consultancy & support
  • Option of Databases - SQL or HANA
  • Integrated Reporting & Analytics
  • Options for multiple currencies and languages
  • Accessible via desktop or mobile
  • Affordable licensing model
  • Cost effective support packages


  • Implement best business practice to your organisation
  • Realise the benefits of real-time reporting
  • Cut costs with a sustainable support model
  • Integrate into existing solutions as required
  • Choose the right hosting and platform solution for your budget
  • Enable your organisation to be agile and responsive to change


£8.97 per user per month

Service documents


G-Cloud 11

Service ID

5 4 2 5 1 2 7 7 8 8 2 6 0 2 6


Edenhouse Solutions

Peter Heffner

+44(0) 330 058 6020


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
SAP recommends that you always upgrade your Business One installation to the highest available release and patch level. Upgrades and patching are not mandatory and maintenance agreements and windows can be agreed with your support partner as required by your business.
System requirements
  • Microsoft® Internet Explorer 8.0 or higher
  • Microsoft® Data Access Components 2.6 (MDAC) or higher
  • 1x Intel® Core® i3 Processor (or equivalent)
  • 2 GB (minimum) Memory
  • Hard Disc System partition 2 GB, Data Partition 1GB
  • DVD-ROM Drive
  • Display 1024 x 768 with 24-bit colors or higher (minimum)
  • Sufficient bandwidth > 100M, Small latency < 1 ms

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support Services are available through Edenhouse (8am - 6pm, Monday to Friday) SAP SuccessFactors provide software support 24/7 through their global online customer portal. Response times/SLA's are dependant on priority of the call.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Edenhouse provide support all SAP products for both technical and functional support. Our support model is time based with time called off in 30 minute increments against an agreed number of days with each day being 7.5 hours. All of our UK based support consultants are highly experienced in Business One solutions and implementations and so we have one charging rate for all consultants as well as a management fee depending on the size and scale of the required model - such as if additional services are request like out of hours support or system monitoring. A named account director and named service delivery manager are assigned to all of our support accounts. Both these individuals perform roadmap planning, and monthly reviews with each of our customers whilst also ensure SLA compliance.
Support available to third parties

Onboarding and offboarding

Getting started
Edenhouse provide onsite training, user documentation & SAP resources to end users. A typical implementation will not require additional user documentation, but will include on-site "train the trainer" sessions to key users who co-ordinate and delivery training to the user base. However, at customer request training can be provided to end users and additional documentation can be provided. There are a multitude of SAP resources available via the SAP portal across a wide variety of subject matters.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Approved users can extract the data from the solution at the end of the contract in CSV format.
End-of-contract process
At the end of the contract term EdenOne will provide an extract from the solution in CSV format. If we are required to work with an external party to transform the data this may attract additional charges.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The Business One Mobile version has a limited span of functionality in comparison to the desktop version - this can be customised dependant on the end user and business requirements.
Service interface
What users can and can't do using the API
Custom APIs are to be agreed with clients on a case by case basis. The majority of functionality and services available through solutions are available through APIs, web services and integration points.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Possible customisations include user interface, data storage, reporting, work flow, authentication authorisation and multiple integrations. Authorised users can customise the solution via a third party application recommended by EdenOne. We would not recommend customisations are developed by non SAP consultants as this poses a risk to the overall viability of the SAP solution. Approved users and EdenOne consultants can customise the solution.


Independence of resources
In relation to the availability of consultancy and support resources, Edenhouse have a successful capacity planning team who ensure that sufficient resources are assigned to the teams in order to provide the required level of resource for our customers. In relation to the demands put upon the hosting services there are a variety of options available depending on customers requirements that ensure that the resilience and availability of the service is unaffected by capacity demands placed upon the solution.


Service usage metrics
Metrics types
To be agreed on a contract by contract basis
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
To be agreed on a contract by contract basis
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
To be agreed on a contract by contract basis - as a general rule the System availability SLA is 99.5%
Approach to resilience
Depending on the hosting option taken by our clients, there are a wide variety of resilience steps taken into account. These can include:

* Redundant additional power network in case of power outage * Backup batteries and generators * Redundant additional coolant systems in case of coolant system failure * Redundant additional internet connection to guarantee connectivity * Data stored in backup location to save-guard against natural disasters and malicious attacks
Outage reporting
To be agreed on a contract by contract basis depending on the hosting option taken by the client.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access is restricted using assigned business roles and organisational management assignment. Restrictions are contextual (e.g. users can see data relating to them, their team, their territory; managers can see data relating to their team members) and can be restricted at different levels: * Screen access (work centres and views) * Fields can be write/read-only or restricted * Actions (e.g. escalating a ticket, exporting specific data to Excel ) Additionally, page layouts and the model rule editor enable setting attributes including visibility of screen sections or specific fields by business role or data (e.g. hide field "x" for complaint tickets).
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
The scope for Edenhouse Solutions ISO27001 accreditation is SAP Support, Enhancements and Projects. What is currently out of scope and therefore not included are the following areas Key management – we do not have a policy on the protection of cryptographic keys as we currently do not use these. Working in Secure areas – We currently have no procedures for working in secure areas as Edenhouse do not have any secure area working currently. Secure development policy – Rules for the development of software are not in place as Edenhouse does not currently develop software. Restrictions on changes to software packages. Currently no procedures in place as we do not develop software. All of the above would be reviewed and policies created should they come into scope for Edenhouse.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
All of our security policies are strictly aligned to ISO27001 Standards. Our Consultants access our B1 customers' systems via secure https connections that require a unique user ID and password. Any email communications are encrypted. Edenhouse is accredited to the 'Cyber Essentials Plus' standard for all its networks and infrastructure. Reporting Structure: Our Chief Information Security Officer is Delivery Director Ian Fisher. Beneath him is our Information Security and Cyber Essentials Team. They ensure that our users adhere to our security policy and processes and these are audited on a regular basis. Each B1 customer has an Account Director and Service Delivery Manager. The B1 team has a Principal Consultant and Team Lead.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We align our change management processes to the customer's requirements, however, for internal changes we have a Change advisory Board to review all change requests and approval is only given from the CAB to proceed with any change.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We have an Annual Vulnerability check and based on the findings from that check we create tasks to eliminate any found vulnerabilities.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our Data Centre have a Network Operations centre which continuously monitor our network and communication lines. We also have internal monitoring where we run an average of 5 million tests per month.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We align ourselves to ITIL incident management processes and use SAP CRM toolset for the incident life cycle.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£8.97 per user per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑