We understand the fact that unless security patches and updates are applied and newer supported versions adopted, such software will become increasingly vulnerable.

We rely on cryptographic protocols that provide communication security over the Internet and continuously subject our software to third party security checks to meet the PCI compliance.

Key Features

  • Role-based Security
  • Ability to setup any number of “user groups”
  • Customized security settings and access rights for each user group
  • Field level access control and permission settings
  • Interface level accessibility settings
  • Access controllable by whitelisting IP addresses
  • Encrypted storage of vital data in database
  • Secured Socket Layer (SSL) access to all important screens
  • Software components audited for compliance