PDF Tables accurately extracts data from PDFs. It uses an AI algorithm which can see column shapes, and outputs spreadsheets. There is a web API so it can be automated.


  • Algorithm automatically identifies tabular rows and columns in PDFs
  • Convert PDF to Excel, CSV, HTML or XML
  • Use from any web browser, without downloading software
  • Output is streamed as it is generated
  • End-to-end encryption with the same technology used by banks
  • API for integration and automation using any programming language


  • Effortlessly convert PDF to a more useable format
  • Publish data without altering upstream process
  • Integrate data extraction into your current operations
  • Automate so data arrives as it is extracted
  • Replace manual document processing & save 000s of operational hours
  • Convert up to 12 PDF pages per second


£800 to £3,750.00 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

5 5 3 0 6 3 1 5 0 8 3 7 4 7 1


Telephone: 0771 0377929

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
System requirements
PDFTables requires Linux servers for private cloud deployments

User support

Email or online ticketing support
Email or online ticketing
Support response times
By end of next working day, but typically quicker.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Emergency 2hrs, Urgent 4hrs, Non-Urgent 2 days Incident escalation process available
Support available to third parties

Onboarding and offboarding

Getting started
We provide user documentation and examples for how to use the API.
Service documentation
Documentation formats
End-of-contract data extraction
Data is automatically provided by the service. Data is deleted after 30 days.
End-of-contract process
There are no additional costs to terminate and end the contract.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
User interface layout may be different for mobile.
Service interface
Description of service interface
Users can upload PDF documents using a web user interface and view or download the extracted data as HTML, CSV, XML or Excel.
Accessibility standards
None or don’t know
Description of accessibility
We aim for at least WCAG 2.1 A but have not conducted a specific evaluation.
Accessibility testing
None as yet.
What users can and can't do using the API
Users can use the full functionality of the service using the API.

Users authenticate their API requests using an API key obtained from the website.

No limitations.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Buyers can post process data obtained through the API.


Independence of resources
We monitor performance and scale our infrastructure to meet demand. We can commission independent hardware for specific customers if desired.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can download uploaded files in multiple file formats.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • XML
Data import formats
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.99. We provide an SLA dependent on the needs of the customer. We also provide a refund model and dependent on the needs of the customer.
Approach to resilience
Our service always runs in multiple availability zones in Amazon Web Services EC2. Should an availability zone become unavailable, traffic is transparently routed to other zones.
Outage reporting
We have a public status dashboard available at

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management interfaces are onto the Amazon Webservices (AWS) system where we follow all the recommended procedures of Multifactor Authentication using text messages and a token device. Management user accounts have been defined with limited and controlled access to the interface; the root account is not routinely used. Only three of the developers have access to the system, and ex-employees have had their login rights deleted.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
There is a senior employee with a special interest and expertise in the field of IT security with primary access to the Amazon Web Services infrastructure. He enforces Multi-Factor Authentication on all access to the AWS system (which itself has many levels of security and access logging) among the team, as well as policies to limit the retention of user data to as little as possible. To date there has been no known unauthorized access of any of the infrastructure.
Information security policies and processes
Our policies predominantly follow a the guidelines set out in the Amazon Web Services (AWS) documentation for its Identity and Access Management (IAM) system. These include defining users with controlled and limited access to the infrastructure and not using the root account for routine access, requiring Multifactor Authentication (MFA) using a token device, and using AWS CloudTrail to log all access events for review. The policies are thought to be appropriate given the size of the development team (4 persons).

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Infrastructure is managed entirely through configuration files. Changes are tracked in git. Before changes are deployed into production, they undergo a review process which includes considering potential security issues and typically involves multiple members of staff.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threats to services were assessed at the architectural design phase, and on an ongoing basis as changes are made.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We respond promptly to security incidents. If there is a risk to customer data, customers are notified as soon as possible after the risk is understood. We are currently reviewing our processes for identifying potential compromises and we anticipate having something in place in the near future.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents to

There is no pre-defined process for common events, as incidents are very rare.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£800 to £3,750.00 a unit a year
Discount for educational organisations
Free trial available
Description of free trial
The trial enables users to convert a limited number of pages for free.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.