AccountsIQ

Cloud Accounting Software

Designed for the Cloud, AccountsIQ Cloud Accounting Software is unique with Accounting, Consolidation and Business Intelligence in one powerful solution. Customers in their thousands have already made the move from aging on-premise products to AccountsIQ’s cloud accounting software. Improve your team’s productivity, streamline processes and give companies greater business insight.

Features

  • True Cloud Collaborative Accounting Software
  • Consolidation - Group accounts consolidation and reporting
  • Fixed Asset Register
  • Open API for seamless integration
  • Real time reporting and Dashboards
  • Full Purchase to Pay Processing
  • General Ledger Business Intelligence
  • Cloud Banking Software
  • Project Ledger
  • Full FX Accouting

Benefits

  • Collaborative Management Accouting
  • Intuitive and user friendly
  • Powerful group wide reporting capabilities
  • Mobile Enabled
  • Use anywhere, anytime to support remote working
  • No capital expenditure
  • User profile management for segregation of duties
  • Enables you to grow your business, add entities easily
  • No hidden costs, one monthly all in one proce
  • Consolidation in one click

Pricing

£250 per instance per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10

945129887628909

AccountsIQ

Lianne Gatti

0203 598 7350

sales@accountsiq.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None to note
System requirements Not applicable true SAAS Cloud

User support

User support
Email or online ticketing support Email or online ticketing
Support response times The support response and resolution times are based on the Service Level Agreement you signed when you became an AccountsIQ customer.

Priority one - Two business hours (Critical issue)
Priority two - Four business hours (Severely degraded use of system)
Priority three - Twelve business hours (Minor issue)
Priority four - Twelve business hours (Enhancement request)
Priority five - twelve business hours (Data on reports)

Service desks is open Monday - Friday (9.00am - 5.30pm). Data Centre support provided 24 7
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels AccountsIQ provides support coverage via the relevant local AccountsIQ office included in the monthly SAAS subscription.

Our support centres are staffed by experienced Support Analysts. Each support analyst has received extensive training specific to the AccountsIQ platform. This ensures that you will be speaking with someone who understands the product you are using when calling the support centre. The Support Analyst will work with you to arrive at a satisfactory resolution as quickly as possible.

Types of support;
Level 1/First Line Support: Assistance provided by an AccountsIQ customer support analyst. The analyst will document the support request, gather pertinent information, attempt first call resolution and escalate the request, if necessary, to a second level support analyst

Level 2/Second Line Support: Assistance provided by an application support specialist or technical support specialist. These analysts have the capability to investigate underlying causes of data issues identified and other more complex support issues

Level 3/Third Line Support: Assistance provided by highly specialised technical support analysts that have direct access to the development platform. Issues that are beyond the scope of the help desk, or found to be related to software defects are normally escalated to this group
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Our methodology requires the right level of client engagement from the outset with clearly defined roles and responsibilities. A detailed overall design requirement together with any custom development work or integrations are factored in and assessed for interdependencies. We bring in senior analysts and developers as required to sit in on planning meetings to ensure that the scope, design and timelines are all agreed by client and supplier. The scale and ambition of any project and the business and employee impact is always key in our assessment of risk which determines the stages of delivery. For example: on a recent implementation replacing SAP B1 and a Custom Project Costing System, requiring Integration with Workspace, a Contract Management and Time Recording System we spilt into 2 distinct teams with a common Project Director link. This enabled one team to focus on implementing the Finance Systems, while the other focused on the Project Ledger which involved a fair degree of business process reengineering.

All training guides are available within the application. These are reviewed and updated, following system updates. We use a combination of online and onsite training, whichever is most appropriate for the client.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction A request needs to be submitted to the service desk at the end of the contract, which the allows for a data extract to be completed and data handed securely to the client. Data is extracted in standard format.
End-of-contract process End of Contract process:
(a) all licences granted under this agreement shall immediately terminate;

(b) each party shall return and make no further use of any Confidential Information belonging to the other party;

(c) the Supplier may delete or otherwise dispose of any of the Customer Data in its possession unless the Customer requests and agrees to pay for ongoing access to the Customer Databases and has paid all fees and charges outstanding at termination. All customer data is owned by the customer, so can be exported prior to the termination of the contract.

(d) the accrued rights of the parties as at termination, or the continuation after termination of any provision expressly stated to survive or implicitly surviving termination, shall not be affected or prejudiced.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service AccountsIQ has a mobile app, which can be purchased as an additional add-on to the service. The mobile app supports approvals on the go, expense management and PO Entry.
Accessibility standards None or don’t know
Description of accessibility Not Applicable
Accessibility testing Not tested
API Yes
What users can and can't do using the API There are c.200 pre-written web service API’s that easily allow data to flow between systems and integrations to be created. These cover all major datasets within the system. AccountsIQ already has numerous integrations built with systems such as Salesforce CRM, Fourth Hospitality systems, Landmark Land Management system, Bleep (ePOS system), iSAMS school administration system and more. These API’s are published online and can be accessed by your IT department to build integrations.

Alternatively, AccountsIQ, being the product owners, can build integrations on your behalf. AccountsIQ can handle protocols such as JSON/SOAP/XML and web services.

AccountsIQ has an open API strategy. This means we have built a tool-set which makes integration easy with other apps. Each time we create an integration with a development partner, it’s available for everyone. Our integration partnerships allow us to quickly deploy integrated solutions for organisations with specific management information or reporting needs such as retail, schools and hospitality. We have also built business-wide solutions integrating data from other systems such as sales and marketing.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available No

Scaling

Scaling
Independence of resources We run continual analytics on the service and scale appropriately to ensure
supply meets demand at all times.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Exported to excel and are there any restrictions / controls around this?
Data can be exported from the application, but is controlled via your security profiling. Data export facilities are provided on each grid of data, including all reports. Data export formats included are excel, pdf and word. There is a full data exporter tool, to export all reference and transaction file data from the system, as and when required.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability AccountsIQ provide at least a 99.5% uptime service availability level (Uptime Service Level). This availability refers to the ability to access the Software over the Internet. It does not apply to the Customer’s own access to the Internet – ie: the portion of the circuit that does not transit the hosting provider's backbone network, as the Customer is responsible for its own internet access.

If Availability falls below the Uptime Service Level (as defined above) in a given month, the Supplier shall credit the Customer's account (Service Credit) for that month by an amount calculated as follows:

2 x (1 – Availability/ Maximum Availability) x the total Monthly Usage Fees due for that month.
Approach to resilience Come back to
Outage reporting Come back to

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels In accordance with the AccountsIQ’s Information Security Policy, support personnel access privileges are assigned to individuals based on the concept of "least privileged", which assigns each user the minimum set of rights and only provides additional access to data if required by job function e.g. the requirement for a support technician to review client data in response to a support ticket. This is assigned and tracked via management oversight. All notable modifications are logged and regularly reviewed.

All users have unique usernames to ensure proper auditing. Support access passwords are temporary and recreated daily using a strong password creation algorithm.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach All AccountsIQ system programs and related client data is hosted with Dimension Data. Dimension Data has a SSAE 16 Type 2 Certification and certified ISO 27001:2005 (GSC) for Information Security along with PCI Certification.

AccountsIQ has implemented an Information Security Management System (ISMS) aligned with the ISO 27001:2005 Information Security Standard.

These policies cover:
Information Security Policy 
Acceptable Usage Policy 
Mobile Acceptable Usage Policy 
Encryption Policy 
Incident Response Policy 
Change Control Policy

All relevant staff have been trained and provided with these policies where appropriate.
Information security policies and processes All AccountsIQ system programs and related client data is hosted with Dimension Data (www.dimensiondata.com). Dimension Data has a SSAE 16 Type 2 Certification and certified ISO 27001:2005 (GSC) for Information Security along with PCI Certification.

AccountsIQ has implemented an Information Security Management System (ISMS) aligned with the ISO 27001:2005 Information Security Standard. These policies cover:

Information Security Policy 
Acceptable Usage Policy 
Mobile Acceptable Usage Policy 
Encryption Policy 
Incident Response Policy 
Change Control Policy

All relevant staff have been trained and provided with these policies where appropriate.

In accordance with AccountsIQ’s Information Security Policy and the Human Resource (HR) policies and procedures in place, background checks on support personnel with access to client data are performed. There are additional controls including requirement for all personnel to sign a Non-Disclosure Agreement (NDA).

Full escalation procedures, reporting hierarchies are in place.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach It is essential that any changes to the production environments, in the datacentres engaged by AccountsIQ through our hosting partner (Dimension Data), are managed in a structured and controlled way to ensure the minimal of disruption to service. We have a clearly defined 13 step process (available on request) for the management of change.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach PricewaterhouseCoopers LLP was commissioned on different occasions to complete an independent security assessment of the public facing networks and AccountsIQ software application . This involved testing the main AccountsIQ software to establish any weaknesses.

This area of testing was designed to replicate the position of an externally located malicious threat, with the intention of compromising the applications in scope, as well as to replicate the position of a user with legitimate access seeking to escalate their assigned level of access or otherwise abuse their position of trust, to gain access to restricted information.

External Infrastructure Penetration Test was carried out.
Protective monitoring type Undisclosed
Protective monitoring approach Please see previous response to Vulnerability
Incident management type Supplier-defined controls
Incident management approach A full incident management policy is in place and available on request.

To ensure an effective and appropriate response to a potential information security incident AccountIQ’s CTO (and Information security manager) shall be contacted immediately and given the details of the incident.

The Information security manager will then evaluate the incident and determine whether it should be treated as an Information Security incident or whether it should be handled as a normal service incident.
The Information security manager will then escalate and notify the appropriate members of the team according to the classification of the incident.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £250 per instance per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial A free trial is provided on the AccountsIQ software for a period of 2 weeks. This includes all features and functions of the applications.

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑