AP Invoice Approval App
Solution Overview

Invoice Approval is a browser-based solution that extends accounts payable (AP) automation to mobile devices and lets enterprise users review and approve supplier invoices without interfacing directly with the accounting business application. Approvers can view invoice header and line details, the invoice image, document attachments and comments added by other users. They also can add comments and reassign approval tasks from their mobile devices


Challenges
  • Lengthy approval cycles: Manual routing, processing and sign-off procedures often involve individuals in different departments and even different countries.
  • AP resource constraints: In organizations with high volumes of invoices, the ratio of approvers to AP clerks can be as high as 50:1. Manual approval processes increase the risk of error and lost or delayed invoices.
  • Costly business disruptions: Accounting applications can be confusing and difficult for infrequent users. Manager- and executive-level approvers end up spending valuable time using a complicated interface that requires a laptop.
Benefits
  • Faster, more accurate invoice approvals: Approvers can approve invoices and view details anytime, anywhere without accessing accounting or financial systems.
  • Increase efficiency for AP staff and approvers: Wider access to invoices means approvers have more options for when and where they review invoices, and AP staff spends less time tracking down approvals.
  • Maintain good relationships with suppliers: Faster approvals and exception resolution shortens payment cycle times and improves vendor relationships

Features
  • Browser-based access from mobile devices
    • Form factor scaling optimizes mobile phone and tablet experience
    • View invoice images, pending tasks, invoice details, status indicators and processing history
    • Interface allows users to take action and leave comments
  • Interface is configurable to user preferences
    • Cookies remember users’ favorite view on each device type used
  • Secure integration and encryption
    • Individual user credentials ensure secure system interaction and administration
    • Encrypted transmission protects data and user information