Best Practice

Proven standard procedures make short and straightforward project processes possible. In the following, we will give you a rough idea of our approach. The process is characterised by four phases:


At this stage, the requirements are identified and possible solution scenarios developed. Contact persons are defined and rough targets formulated. At the end of this phase, the initial project plan has been adopted and all the necessary activities have been initiated.


Analysis has the purpose to identify all the delivery systems and to determine the individual data streams that are relevant for the SVA CIC. Upon completion of the analysis phase, all information about the structure and nature of the IT landscape and the data streams have become well-known facts.


Following the analysis, the phase of conceptual work begins. First, a rough and then a fine concept are developed for implementation. Any questions regarding the implementation are posed at this stage and answered with regard to the individual customer situation. The result is a detailed project schedule; all stakeholders are now informed about the procedure.


Implementation begins with the extraction of relevant data and transfer of the data to the Liberyse system. All necessary tests are carried out and improvements made, followed by the go-live. Production is handed over as are the operating manuals and process documentation; training is conducted, if necessary, and the certificate of implementation is issued.


Depending on your needs and the desired service level, we can provide a tailor-made service. In addition, our support is available to our customers for all technical questions.

Proof of Concept

As part of a "Proof of Concept" you can see the advantages of SVA CIC for yourself. The test installation and import of sample data are free of charge.



Our competence team is available for detailed consultation.
We will gladly answer your questions.

Make an appointment now!

  • Independent of systems, platforms and databases
  • Maintaining and enhancing business logic
  • Audit-proof archiving (access in terms of Z1, Z2, Z3)
  • Several analysis options (CSV, IDEA, PDF)
  • Flexible, multi-tenant security model
  • Data deletion after preservation period
  • Inclusion of other archive system