Moore Stephens Insight Limited

18: AIM ETL Data Transformation Tool in the Cloud

AIM ETL (Accounting Interface Module, Extract Translate Load) is an established Cloud-based tool that enables the transfer of data between systems. Its flexibility makes it ideal for migration or interfacing, reformatting and transforming data according to user-configurable rules.

See Service_Definition document for complimentary services.
ERP: Finance, Procurement, HR, Payroll, more…


  • Accounting Interface Module to Extract, Translate and Load data
  • Specification of data management, conversion or archive strategy and requirements
  • Detailed data interfaces and migration strategy, requirements definition and plans
  • Rules-based translation engine against flat input files
  • Prepare data for systems integration / data migration
  • Translate records against reference tables and apply structured logical rules
  • Handling of complex, bespoke third-party interfaces
  • Create standard output / upload formats for receiving systems
  • Template approach to definition, build, processing, scheduling and maintenance
  • Full audit trail of decisions, changes and reconciliation actions


  • Standard, documented tools and methodologies proven over 25+ years.
  • Efficient data collation, enhancement, cleansing, transformation and validation
  • Robust, non-technical, low maintenance, definable, logical, rules-based translation / interfaces
  • Rapid configuration - technical programmers not required
  • Allows simple and complex rules to be applied by users
  • Enables staged and controlled data migration approach
  • Full migration load and reconciliation support plus live interface support
  • Library of standard file output formats (e.g. BIF)
  • End-to-end error, interface and migration audit trails (internal / external)
  • Experience includes Oracle, SAP (4/HANA ECC6), Unit4, Advanced, CapitaIBS, Microsoft.


£10000 per unit

Service documents


G-Cloud 11

Service ID

7 0 5 2 9 7 6 9 5 2 1 1 5 8 6


Moore Stephens Insight Limited

Kate Hill

020 7952 4690

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
AIM ETL can work effectively as an extension to, or interface between, finance and ERP systems and other line of business systems.
Cloud deployment model
Private cloud
Service constraints
Every project has its individual requirements. We will therefore work with you to understand whether there are any specific service constraints which would need to be considered.
System requirements
  • AIM ETL can be operated as a standalone product
  • Outputs from source systems need to be provided
  • Target systems need to be able to accept imports
  • We can provide cloud hosting or we can use yours

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our team are available to answer your questions and support you where required. We provide email support as necessary throughout the course of projects and aim to respond to questions as quickly as possible.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We will work with your team throughout the project and be available to answer questions or support you where required. We will assist in defining the support / service levels required for your instance of the AIM ETL. We also provide a range of support for training depending upon your needs (as outlined above).
Support available to third parties

Onboarding and offboarding

Getting started
Building on our overarching approach to planning, we have tools, methodologies and experience to help you migrate from your current systems and ways of working to new cloud services. The exact tasks and responsibilities will be specified in detail in conjunction with yourselves in the schedule/plan with clear governance around resources, work-streams, milestones and engagement. Throughout the migration activities we will ensure robust processes for data migration, interfaces / integrations, business change, engagement, transformation, reconciliation, cutover, security, regular structured testing cycles (including System, Unit, UAT, Integration, Performance, Migration Rehearsal, OAT, Business Readiness and Acceptance) and Business Continuity. To further assist your migration, we can also provide hands-on support during early-life of your new cloud solution including training and communications services and benefits-realisation planning.
Service documentation
End-of-contract data extraction
Your transactional data will be provided in export files in the appropriate format as required so will not need to be extracted from the system. However, you may like to extract mapping tables and so on for future reference. All data such as this in the application can be extracted in .csv format.
End-of-contract process
At the end of the contract access to the service will cease and data can be provided as required.

Using the service

Web browser interface
Application to install
Designed for use on mobile devices
Service interface
Customisation available
Description of customisation
Buyers can be given full access to amend import, transformation and export rules. These use simple, logical rule-sets that can be amended by the end user through a simple user interface.


Independence of resources
Each instance of AIM ETL is hosted on a separate virtual machine on the relevant cloud environment. The cloud environment can be scaled appropriately to meet service demands.


Service usage metrics
Metrics types
AIM ETL logs the numbers and types of files processed which can be reported as required. The system can also be used to create a record / audit trail of decisions, changes to rule-sets and reconciliation actions.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach
AIM-ETL is generally hosted on Microsoft Azure so security is in-built through the platform. Microsoft leads the industry in establishing clear security and privacy requirements and then consistently meeting these. Azure meets a broad set of international and industry-specific compliance standards, such as General Data Protection Regulation (GDPR), ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2, as well as country-specific standards, including UK G-Cloud and Australia IRAP. Rigorous third-party audits, such as those done by the British Standards Institute, verify Azure’s adherence to the strict security controls these standards mandate.

Data penetration testing can be arranged as required.
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Transactional data as part of a migration or interface is exported according to logical rule-sets configured in the system. It can be exported in a wide-range of formats as required by the target system. Configuration data can be exported in .csv format for future reference.
Data export formats
  • CSV
  • Other
Other data export formats
  • Flat text file (e.g. txt, BIF, ...)
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • Flat text file
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
AIM ETL can be installed, hosted and configured to meet client requirements and security will be part of the initial scoping discussions to ensure your data is always secure.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLA's are dependent on client requirements, but are typically 99+%.
Approach to resilience
Use of Microsoft Azure provides an in-built resilience along with individual hosting environments.
Outage reporting
We report outages to named individuals via email.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Users can be assigned varying levels of access and authority dependent on the roles they undertake.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • ISO9001
  • Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Cyber Essentials
Information security policies and processes
We have information security and data protection policies which are available on request. Reporting of any security / protection concerns is via our Data Protection Officer.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
A detailed Functional Specification is agreed during the scoping and design stages of the work. The will include full details of all configuration parameters. Any required changes go through a structured change control process including review by relevant stakeholders. When approved they are updated in the relevant documentation, implemented in a test environment and comprehensively tested before being migrated into the live environment.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Microsoft Azure platform has built-in vulnerability checking and provides reports which are reviewed and acted upon as appropriate.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The Microsoft Azure platform has built-in compromise checking and provides reports which are reviewed and acted upon as appropriate.
Incident management type
Supplier-defined controls
Incident management approach
Moore Stephens Insight has structured incident management processes which are followed for all services. Users report incidents via their dedicated contact which then initiates the process. Incident reports can be provided on request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£10000 per unit
Discount for educational organisations
Free trial available

Service documents

Return to top ↑