Home > Epicor Express Services - Q&A

Epicor Express Services - Q&A

Supplier News

How do customers get started with the Epicor Express?
Once subscribed to the solution, they are then assigned an Implementation Project Manager. This Project Manager will follow up shortly after signing,  they will discuss the processes and coordinate the following steps.

How long does it usually take to implement Express software?
The target is usually 20 to 30 business days. The methodology has been designed to simplify processes and reduce efforts required to “go-live”. However these estimated times may vary due to customer preferences, availability of resources and ability to balance day to day operations with the addition of project tasks and data migration requirements.

Are systems for testing and training allowed?
Yes, customers are provided with access to a secure pilot system within the cloud. This system is a duplicate of their live system  and includes a copy of their data in a separate environment. It is designed for and can be used for process modeling, testing, and training.  

Are standard Epicor Express services provided on-site?
Epicor has a remote consultancy service which operates specifically for Epicor Express, it is designed to help keep implementation costs low for it's customers. Remote handling of initial set up and data migration can go through the final go-live checklist. However,  on-site consultancy services can be provided within normal terms.

Are the Epicor Express systems secure?
It is hosted from top-tier data centers that use only the latest in technology and attributes including:

  • Use of  physical security and access control
  • Redundant power, cooling, and communication networks
  • Very early warning fire detection and suppression system
  • Advanced network monitoring and protection
  • SAS 70II certified processes and controls    
Communication between end users and the data center is encrypted using 128bit SSL encryption technology,  end-user authentication and access is controlled within the Epicor application security model. It is only provided to those who have the proper credentials, otherwise access is denied.

Newsletter sign-up

The latest products and news delivered to your inbox