The only solution on the market that lets you streamline the registration and approval of travel activities just by using your smartphone, a Web browser and Microsoft Dynamics NAV.
- Smartphone Personal Expenses
- Web Portal Access
- Approval Workflow
- Business Card Bank Integration
- Business intelligence and reporting
- Microsoft Dynamics NAV Integration
- Quicker Expense Processing
- Increased Efficiency in Expense Processing
£50 to £50 per user per month
- Education pricing available
- Free trial available
Total Enterprise Solutions
0845 257 8241
|Software add-on or extension||Yes|
|What software services is the service an extension to||Microsoft Dynamics NAV|
|Cloud deployment model||Hybrid cloud|
|Service constraints||There are no service constraints.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Operates Monday-Friday, 09:00-17.30, excluding UK public holidays & weekends. Priority 1: System down situation severely impacting customer production and/or productivity. Response: 10 Minutes then hourly updates. Resolution: 4 hours (working hours) Priority 2: Time sensitive issue important to long-term productivity, not causing an immediate stoppage. Response: 2 hours. Resolution: 8 hours (working hours) Priority 3: Issue which does not have significant current productivity impact for the customer. Incidents will be grouped and resolved at mutually convenient times. Response: 2 Hours then mutually agreed updates. Resolution: 3 days Priority 4: General advice. Response: Next Business Day. Resolution: 5 days|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 AAA|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.0 AAA|
|Web chat accessibility testing||Skype and Team viewer.|
|Onsite support||Onsite support|
We offer a Total Managed Services for Microsoft Dynamics NAV.
From our market leading ITSM ServiceNow system, self service portal, service desk team ready to take your call, remote support, webinars, on site training, on site support, virtual IT Director, strategic planning days.
Whatever support you require we can meet your needs.
|Support available to third parties||Yes|
Onboarding and offboarding
We have a proven methodology to empower users through onsite training.
There are also live webinars, videos, customer source portal and user documentation.
|Other documentation formats||Word|
|End-of-contract data extraction||
Data can be exported in various electronic devices. We are ISO 27001 certified and are safe handling your data.
We do not store any of your data on our servers.
|End-of-contract process||TES are happy to assist with transitional activities at the end of a contract. This may be chargeable depending on the nature of the work required.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Full Microsoft Dynamics NAV information is available via mobile phone or any mobile device.|
|Accessibility standards||WCAG 2.0 AAA|
|Accessibility testing||Many of our customers use NAV on their phones, tablets and laptops.|
|What users can and can't do using the API||Web services can be deployed based on any application functionality.|
|API documentation formats|
|API sandbox or test environment||Yes|
|Description of customisation||Each page can be customized to the users requirements.|
|Independence of resources||Microsoft Online Services utilises various Cloud Scale technologies which ensures multi-tenant services are not affected in terms of peak usage.|
|Service usage metrics||Yes|
|Metrics types||Regular updates of our support service through ServiceNow.|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Continia|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||Never|
|Protecting data at rest||
|Other data at rest protection approach||ISO 27001|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Data can be imported or exported as required. It can be stored locally or in the Cloud.|
|Data export formats||
|Other data export formats|
|Data import formats||
|Other data import formats|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
We guarantee at least 99.9% availability of the Azure Active Directory Basic and Premium services. The services are considered available in the following scenarios:
Users are able to log in to the service, log in to the Access Panel, access applications on the Access Panel and reset passwords.
IT administrators are able to create, read, write and delete entries in the directory, or provision or de-provision users to applications in the directory.
No SLA is provided for the Free tier of Azure Active Directory.
|Approach to resilience||
Application resilience is a function of the Azure environment in which NAV is hosted.
Public dashboard. (Azure admin centre)
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Password entry|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI|
|ISO/IEC 27001 accreditation date||31/12/2017|
|What the ISO/IEC 27001 doesn’t cover||N/A|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
We have a information security management system implemented under our ISO 27001 certification. This describes multiple policies and adherence to these is assessed through regular management reviews.
This can be evidenced on request.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||Configuration and change management processes are described in the ISMS-03-002 process of our Information Security Management System (ISMS) which is available on request. This outlines procedures for change scoping, change advisory board (CAB), risk management and deployment.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||Vulnerability management is described in the ISMS-03-003 Risk Assessment Procedure of our Information Security Management System (ISMS) and is available on request. It outlines how to identify, classify and manage risks in the context of information security and business continuity.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
Protective monitoring of internal system is achieved by deploying proprietary organisation wide anti-virus and network protection software to all client and server environments. This is administered centrally and subject to mandatory update policies. Usage of this tool is managed under the wider ISMS.
Azure hosted application components inherit security from Microsoft Azure SLA.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||The Information Security Management System (ISMS) implemented as part of our ISO 27001 certification includes a security incident management policy ISMS-02-009 (available on request). This classifies security incidents describes how to report them and also the activities of the Security Committee.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£50 to £50 per user per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Full live demonstration of the product available|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|