Vendor Information Questionnaire
1) Does this software support zero downtime?
Ans: 99% uptime support
2) What is the technological stack of the product?
Ans: Technology Stack
3) Please provide technical architecture of the solution.
4) Is your product cloud provider agnostic?
Ans: Yes
5) Does this software utilize Machine Learning/ AI to provide BI reports? Please provide the details of ML/ AI usage.
Ans: AI - ML Usage
6) Does this software offer forecasting?
Ans: We are developing a tool, named Chanakya. (More Details about Chanakya)
7) What security features does this software have?
Ans: VAPT
8) What all regulations do this software compliant with?
Ans: Kindly share the list so we can reply to the same.
9) What is the maximum concurrent number of users system currently supports?
Ans: Upto 5000 users
10) Is the Solution multi-location deployable? If yes, how sites are kept in sync?
Ans: NO we will not be able to provide multi location Deployment Cloud Deployment With Multilocation Data Centers services
11) How new versions and upgrades are rolled out?
Ans: StrategicERP's centralized ERP Store is built into the ERP Admin Module to update patches.
12) How bug fixes are delivered? Are fixes consolidated?
Ans: Bug fixing and patched updates done on app Store that is available for updates.
13) Does software support high availability? If yes, How is it handled?
Ans: Cloud Deployment and App store required patched without downtime software support high availability
14) How often releases or upgrades happen? what is old version support plan?
Ans: Twice a year- small and major one
15) How scalability is achieved when number of users as well as data is increased?
Ans: Server configuration along with storage size management
16) How failures are handled in system?
Ans: Regular monitoring, Error log alerts automation to Cloud administration and new patch updation as required.
17) What is the SLA for software failure recovery?
Ans: 24 Hrs maximum for routine issue and 72 Hrs for Major Failure.
18) How BI is incorporated in the software?
Ans: We are coming up with a new tool, Chanakya for BI, already automated as many processes as possible.
19) How infrastructure and data security is handled in your application?
Ans: In the following ways-
- Dedicated cloud with multi-location data centers
- Server audit by experts
- SOP for cloud management
- Backup
- Security policies
- Strict Password
- Access validation
- Data back-up in case of disaster
20) What methodologies do you use for security testing of your product?
Ans: The methods are listed below-
- Best architecture design at first place
- Secured infrastructure dedicated database
- Validation & secure authentication
- Security testing with all scenarios possible
- Penetration testing
- Required data encryption
21) Is data residing encrypted?
Ans: Passwords are encrypted but other data is not.
22) Is SSL support available?
Ans: Yes
23) Is this software supported on all available cloud platform? Is your system cloud agnostic?
Ans: We have tested our configuration on various cloud service providers such as AWS (Amazon Web Services), GCP (Google Cloud Platform), OVH and E2E without any modifications to the codebase.
24) Where does the ownership of data lie?
Ans: Ownership of data pertaining to customer is owned by customer only. They can download the file for backup and store it with them.
25) Is your application multi-tenant? How is achieved?
Ans: Our application supports single tenancy and multi tenancy as well. Multi tenancy is achieved by using a single application instance and an individual database for each tenant.
26) How data privacy is maintained for in-transit?
Ans: For in transit, data is transferred through secure mediums using secure protocols.
27) What is the upgrade cycle?
Ans: Every 6 Months
28) How high availability is maintained?
Ans: Usage of reliable dedicated servers, monitoring by automatic scripts that raise alarm when load goes high.
29) How scalability is managed?
Ans: -- Our servers are over scaled based on the previous records and hence dynamic scalability by adding new server in the cluster is not used in a production enviornment.
30) What encryption algorithm is used for SSL?
Ans: RSA
31) What is the SLA for infrastructure or software failure recovery?
Ans: -- Please click here to read about disaster recovery.