Moore Stephens Insight Limited

18: AIM ETL Data Transformation Tool in the Cloud

AIM ETL (Accounting Interface Module, Extract Translate Load) is an established Cloud-based tool that enables the transfer of data between systems. Its flexibility makes it ideal for migration or interfacing, reformatting and transforming data according to user-configurable rules.

See Service_Definition document for complimentary services.
ERP: Finance, Procurement, HR, Payroll, more…

Features

  • Accounting Interface Module to Extract, Translate and Load data
  • Specification of data management, conversion or archive strategy and requirements
  • Detailed data interfaces and migration strategy, requirements definition and plans
  • Rules-based translation engine against flat input files
  • Prepare data for systems integration / data migration
  • Translate records against reference tables and apply structured logical rules
  • Handling of complex, bespoke third-party interfaces
  • Create standard output / upload formats for receiving systems
  • Template approach to definition, build, processing, scheduling and maintenance
  • Full audit trail of decisions, changes and reconciliation actions

Benefits

  • Standard, documented tools and methodologies proven over 25+ years.
  • Efficient data collation, enhancement, cleansing, transformation and validation
  • Robust, non-technical, low maintenance, definable, logical, rules-based translation / interfaces
  • Rapid configuration - technical programmers not required
  • Allows simple and complex rules to be applied by users
  • Enables staged and controlled data migration approach
  • Full migration load and reconciliation support plus live interface support
  • Library of standard file output formats (e.g. BIF)
  • End-to-end error, interface and migration audit trails (internal / external)
  • Experience includes Oracle, SAP (4/HANA ECC6), Unit4, Advanced, CapitaIBS, Microsoft.

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to AIM ETL can work effectively as an extension to, or interface between, finance and ERP systems and other line of business systems.
Cloud deployment model Private cloud
Service constraints Every project has its individual requirements. We will therefore work with you to understand whether there are any specific service constraints which would need to be considered.
System requirements
  • AIM ETL can be operated as a standalone product
  • Outputs from source systems need to be provided
  • Target systems need to be able to accept imports
  • We can provide cloud hosting or we can use yours

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Our team are available to answer your questions and support you where required. We provide email support as necessary throughout the course of projects and aim to respond to questions as quickly as possible.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We will work with your team throughout the project and be available to answer questions or support you where required. We will assist in defining the support / service levels required for your instance of the AIM ETL. We also provide a range of support for training depending upon your needs (as outlined above).
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Building on our overarching approach to planning, we have tools, methodologies and experience to help you migrate from your current systems and ways of working to new cloud services. The exact tasks and responsibilities will be specified in detail in conjunction with yourselves in the schedule/plan with clear governance around resources, work-streams, milestones and engagement. Throughout the migration activities we will ensure robust processes for data migration, interfaces / integrations, business change, engagement, transformation, reconciliation, cutover, security, regular structured testing cycles (including System, Unit, UAT, Integration, Performance, Migration Rehearsal, OAT, Business Readiness and Acceptance) and Business Continuity. To further assist your migration, we can also provide hands-on support during early-life of your new cloud solution including training and communications services and benefits-realisation planning.
Service documentation No
End-of-contract data extraction Your transactional data will be provided in export files in the appropriate format as required so will not need to be extracted from the system. However, you may like to extract mapping tables and so on for future reference. All data such as this in the application can be extracted in .csv format.
End-of-contract process At the end of the contract access to the service will cease and data can be provided as required.

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices No
Service interface No
API No
Customisation available Yes
Description of customisation Buyers can be given full access to amend import, transformation and export rules. These use simple, logical rule-sets that can be amended by the end user through a simple user interface.

Scaling

Scaling
Independence of resources Each instance of AIM ETL is hosted on a separate virtual machine on the relevant cloud environment. The cloud environment can be scaled appropriately to meet service demands.

Analytics

Analytics
Service usage metrics Yes
Metrics types AIM ETL logs the numbers and types of files processed which can be reported as required. The system can also be used to create a record / audit trail of decisions, changes to rule-sets and reconciliation actions.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach AIM-ETL is generally hosted on Microsoft Azure so security is in-built through the platform. Microsoft leads the industry in establishing clear security and privacy requirements and then consistently meeting these. Azure meets a broad set of international and industry-specific compliance standards, such as General Data Protection Regulation (GDPR), ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2, as well as country-specific standards, including UK G-Cloud and Australia IRAP. Rigorous third-party audits, such as those done by the British Standards Institute, verify Azure’s adherence to the strict security controls these standards mandate.

Data penetration testing can be arranged as required.
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Transactional data as part of a migration or interface is exported according to logical rule-sets configured in the system. It can be exported in a wide-range of formats as required by the target system. Configuration data can be exported in .csv format for future reference.
Data export formats
  • CSV
  • Other
Other data export formats
  • Flat text file (e.g. txt, BIF, ...)
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • Flat text file
  • XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks AIM ETL can be installed, hosted and configured to meet client requirements and security will be part of the initial scoping discussions to ensure your data is always secure.
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability SLA's are dependent on client requirements, but are typically 99+%.
Approach to resilience Use of Microsoft Azure provides an in-built resilience along with individual hosting environments.
Outage reporting We report outages to named individuals via email.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Users can be assigned varying levels of access and authority dependent on the roles they undertake.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • ISO9001
  • Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Cyber Essentials
Information security policies and processes We have information security and data protection policies which are available on request. Reporting of any security / protection concerns is via our Data Protection Officer.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach A detailed Functional Specification is agreed during the scoping and design stages of the work. The will include full details of all configuration parameters. Any required changes go through a structured change control process including review by relevant stakeholders. When approved they are updated in the relevant documentation, implemented in a test environment and comprehensively tested before being migrated into the live environment.
Vulnerability management type Supplier-defined controls
Vulnerability management approach The Microsoft Azure platform has built-in vulnerability checking and provides reports which are reviewed and acted upon as appropriate.
Protective monitoring type Supplier-defined controls
Protective monitoring approach The Microsoft Azure platform has built-in compromise checking and provides reports which are reviewed and acted upon as appropriate.
Incident management type Supplier-defined controls
Incident management approach Moore Stephens Insight has structured incident management processes which are followed for all services. Users report incidents via their dedicated contact which then initiates the process. Incident reports can be provided on request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £10000 per unit
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑