Flexible Pricing plans
Choose an affordable plan that comes with the best features included.
All topics are subject to be changed according specific customer requests |
Starter
€600/quarter
|
Confident
€1300/year
|
Strategic
€3600/3 years
|
Service | |||
---|---|---|---|
Initial set-up | + €1000 one time | + €1000 one time | + €1000 one time |
Training online | + €25/hour/person (min 3 persons) | + €25/hour/person (min 3 persons) | + €25/hour/person (min 3 persons) |
Training on-site | + €100/person/day (min 3 persons) | + €100/person/day (min 3 persons) | + €100/person/day (min 3 persons) |
New app development / changes when requested | + €10/ working hour | + €10/ working hour | + €10/ working hour |
Free training materials | |||
Free support by email and phone | |||
Maximum number of active sub-accounts (users) | 100 | 300 | 500 |
Storage space | 150 GB (+ €10/extra 50 GB/month) | 200 GB (+ €10/extra 50 GB/month) | 300 GB (+ €10/extra 50 GB/month) |
Export data (local backup) | |||
Applications | |||
DMS (Document Management System) | |||
Internal KPI management | |||
Internal audits management | |||
Measuring and Control equipment | |||
Action Plans management | |||
Internal meetings (if requested) | |||
Human Resources (Training plan, Skill matrix) (if requested) | |||
Internal and external complaints (8D) (if requested) | |||
Warehouse Inventory (integrated barcode) (if requested) | |||
Project management (if requested) | |||
Maintenance management (if requested) | |||
SPC-Cpk (if requested) | |||
Development of a new application (if requested) | |||
Specifications | |||
Service uptime guarantee (when requested, there is no charge for the month with lower uptime) | 99% / month | 99% / month | 99% / month |
Help desk availability | 7:00-21:00; 7/7 days (email & phone) | 7:00-21:00; 7/7 days (email & phone) | 7:00-21:00; 7/7 days (email & phone) |
Reaction time | maximum 12 hours | maximum 12 hours | maximum 12 hours |
Confidentiality | Read 'Usage Terms' and 'Privacy Policy'. We apply Best practices: - GDPR compliant applications and clear licesing terms; - we do not use cookies; | ||
Cyber Security | Read 'Usage Terms' and 'Privacy Policy'. We apply Best practices: - closed access to public, no guest access; - limit access by IP; - SQL injection attacks addressed by SQL server, but before there is an 100% inputs sanitization; - Denial of service attack (DDoS) is addressed by server set-up; - Full Penetration Testing (yearly); - Server Log analisys (weekly); |