How much admin time will this save?

Clients have cut admin time by 80% after implementing the application. Once set up the application runs itself. The application will also save on money and paper.

How long does it take to get started?

You can be up and running within minutes. The intuitive layout makes it easy to set up and we offer comprehensive help articles. In training we go through the different set up options and go through your booking scenarios to set up the application to your needs. We also provide templates for confirmation and invoices. If integrating with a bank you will need to contact your bank to set up your merchant terminal if you don’t already have one. For most banks this can take upto 10 business days.

Do you resell our client data?

No. Client data is NOT the property of iSmart Software and we do not keep copies of client data. Clients can request a physical back up of their data at any time. On request or termination of an agreement, we sanitize all client data.

Do you have a diaster recovery plan?

Yes. To best respond in a disaster situation our infrastructure includes instance redundancy, use of multiple availability zones within a region, load balancing, auto scaling, monitoring and recovery. Our disaster recovery plan is tested regularly across a multitude of scenarios including power loss, virus attack etc.

What banks do you integrate with?

We integrate directly with several bank terminals and third party providers. If you don’t see your bank below – no problem. Let us know who you bank with and our developers will research the most suitable option for API integration.
  • BPoint – Commonwealth Bank of Australia
  • SagePay
  • NAB Transact – National Australia Bank
  • MiGS – ANZ eGate (NZ) and Bendigo Bank
  • PayWay – WestPac

Are you PCI Compliant?

iSmart Software is PCI Compliant as a Level 2 Service Provider. We do not store Credit Card details – only transmit.

Is our data safe?

iSmart Software is committed to securing all our products, services and customer information. We secure your information and database at top tier Amazon Web Services who control the physical and environmental components of security. We employ the industry standards in our development process. Our application design and development take into consideration the identified risks are regularly reviewed. This benchmark ensures our software is safe, secure and reliable. Access into the application in handled by password authentication and limited by role based control. All administrative, user, critical and key business transactions are logged and recorded to build a historical audit trail.

Please contact us if you have any further questions.