Xelix simply bolts onto your existing systems
Setup is a simple, three-step process
Nobody wants a long and intensive implementation project – too many software projects fail at the first hurdle. As such, we have designed Xelix to be a simple bolt-on that can be up and running in as little as four-to-six weeks from kick off to go-live. Depending on the product suite being implemented, Xelix requires a combination of a daily file of invoice data and master vendor data, as well as a one-off file of historic invoices from your ERP/AP systems. We also offer a simple email integration. We have pre-built reports for most systems so there’s minimal IT input required.
Xelix works with all ERP, P2P and email systems
Request our Security whitepaper
Xelix delivers a scalable application with high availability and dependability. Protecting the confidentiality, integrity and availability of our customer’s data is of the utmost importance to Xelix, as is maintaining customer trust and confidence. This document is intended to summarise Xelix’s standards compliance, security framework and operational practices.
"The implementation was really straightforward. We were able to establish the requirements and create an automated data flow from our finance system to Xelix with minimal technical support and in quick time.”
The protection of your data is our priority
Xelix delivers a scalable application with high availability and dependability. Protecting the confidentiality, integrity and availability of our customers’ data is of utmost important, as is maintaining customer trust and confidence.
Our credentials include:
- ISO27001 certified (Certificate no. 8320, issued Oct 2019)
- SOC2 certified
- Secure hosting with AWS
- All data is stored in the EU, US or UK and is fully GDPR compliant
- Regular penetration testing to uncover vulnerabilities by external security experts
- Customer data is encrypted in both transit and storage
- Safe and smart segmentation of client data to ensure privacy and eliminate risk around data leakage
- Robust back-up and disaster recovery process
- Extensive employee background checks.
For more info on our security protocols, our security white paper is available upon request.