Tradepoint Business Management Solutions - Everything Business, connected.
Shopping CartCart: 0 Items, Total: $0.00
Login to your Account
Get a FREE Demo - Try Tradepoint for 30 days

Security

May/17/2005



Tradepoint was built first with security in mind.  From its 3 x 512 bit encrypted database to its custom driven tab boxes and data entry fields, every corner of Tradepoint is secure from hack attack or invalid employee access.   Each and every employee must log in to Tradepoint in order to utilize Tradepoint and by doing so, experience their own custom experience of Tradepoint.  By setting up your Tradpeoint login security policies, you as an administrator has complete control as to what windows certain staff is allowed to see, what information tabs will be able to be accessed by them and even what fields they can have Read Access, Edit Access, Write Access or all three. 

 

Tradepoint completely customizes itself to your specific security schemes by simply clicking off check boxes in our easy to use security section.  This section can be found in:  file à security policies.  There you will be able to add staff security policies like:  Salesperson, Sales manager, divisional manager, Administrator and any other access type.  All will create a custom experience of Tradepoint that enables each party to only access windows and functionality they are allowed to access or edit.  An example would be:  Your Salesperson policy allows your sales staff to view only their own leads or customers and edit their own leads or customer information.  Your sales manager policy allows your managers to access their own client information as well as all of the sales people under their management.  The division manager can see all of the above but also have access to the accounting sections and reporting sections of Tradepoint in order to do their job effectively.  

 

In building your security access scheme, we suggest starting at the lowest level of staff access and adding access rights layer by layer.  This technique ensures Tradepoint will stay secure, while still allowing staff to have complete customizable access to every field they require.  Every area of the software is completely customized to your security needs.  There are well over 5000 check boxes that control the security features.

 

A strategic added bonus to having every staff utilize their own unique login, is that you can now track “who changed what” in your company; so if any important items or information for some reason gets corrupted or missing, you as a manager will have a complete auditable trail of your information flow index able by employee name and ID; a powerful feature for conflict resolution and management tracking tool. Tradepoint is one of the most powerful and secure data managers available today.  Your information is safer inside of Tradepoint than it is stored even located on your local hard drive.

 

Tradepoint has even been hack tested to ensure only access permitted staff can access your database.  Even if your computers, servers or database got hacked, Tradepoint is locked down to ensure the hacker will only be able to see a completely encrypted database.  Meaning a database that contains infomraiton that looks like “g32%23; fgs gen23lkj $^2ndinl4^43278 asinhahsdi”  Because our unique data encryption scheme, Tradepoint can’t even be unlocked with random encryption key generators.  Even if a super computer found a way to decrypt one layer, the end result to the success full decryption will be another layer of encryption. Therefore the computer will never know that it got the decryption right.  There is no way to confirm the decryption worked because there would be no “English” to return to the computer after the random key was tried.  Therefore your database can not be “Muscled through” like every other database out there.  Even if your database was stolen and attempted to attach to a third party SQL server on a hacked system, Tradepoint still will not allow read access unless read through your specific custom created CD key and administrative login rights.  Your data is as secure as any private or even governmental data management scheme can get.  In short, if hacked, your database will always be completely useless to hackers or the competition simply because the information any hacker will see will always be encrypted and locked down.


Thank you for Adding an Item to your cart

# of Items Added: 1
Total of Items Added: 0.00
Continue Shopping Show Your Shopping Cart