Security
May/17/2005
Tradepoint was built first
with security in mind. From its 3 x
512 bit encrypted database to its custom driven tab boxes and data entry fields,
every corner of Tradepoint is secure from hack attack or invalid employee
access. Each and every
employee must log in to Tradepoint in order to utilize Tradepoint and
by doing so, experience their own custom experience of Tradepoint. By setting up your Tradpeoint login
security policies, you as an administrator has complete control as to what
windows certain staff is allowed to see, what information tabs will be able to
be accessed by them and even what fields they can have Read Access, Edit Access,
Write Access or all three.
Tradepoint completely customizes itself to
your specific security schemes by simply clicking off check boxes in our easy to
use security section. This section
can be found in: file à
security policies. There you will
be able to add staff security policies like: Salesperson, Sales manager, divisional
manager, Administrator and any other access type. All will create a custom experience
of Tradepoint that enables each party to only access windows and
functionality they are allowed to access or edit. An example would be: Your Salesperson policy allows your
sales staff to view only their own leads or customers and edit their own leads
or customer information. Your sales
manager policy allows your managers to access their own client information as
well as all of the sales people under their management. The division manager can see all of the
above but also have access to the accounting sections and reporting sections of
Tradepoint in order to do their job effectively.
In building your security access scheme, we
suggest starting at the lowest level of staff access and adding access rights
layer by layer. This technique
ensures Tradepoint will stay secure, while still allowing staff to have
complete customizable access to every field they require. Every area of the software is completely
customized to your security needs.
There are well over 5000 check boxes that control the security
features.
A strategic added bonus to having
every staff utilize their own unique login, is that you can now track “who
changed what” in your company; so if any important items or information for some
reason gets corrupted or missing, you as a manager will have a complete
auditable trail of your information flow index able by employee name and ID; a
powerful feature for conflict resolution and management tracking tool. Tradepoint is one of the most powerful
and secure data managers available today.
Your information is safer inside of Tradepoint than it is stored
even located on your local hard drive.
Tradepoint has even been
hack tested to ensure only access permitted staff can access your database. Even if your computers, servers or
database got hacked, Tradepoint is locked down to ensure the hacker will
only be able to see a completely encrypted database. Meaning a database that contains
infomraiton that looks like “g32%23; fgs gen23lkj $^2ndinl4^43278
asinhahsdi” Because our unique data
encryption scheme, Tradepoint can’t even be unlocked with random encryption
key generators. Even if a super
computer found a way to decrypt one layer, the end result to the success full
decryption will be another layer of encryption. Therefore the computer will
never know that it got the decryption right. There is no way to confirm the
decryption worked because there would be no “English” to return to the computer
after the random key was tried.
Therefore your database can not be “Muscled through” like every other
database out there. Even if your
database was stolen and attempted to attach to a third party SQL server on a
hacked system, Tradepoint still will not allow read access unless read through
your specific custom created CD key and administrative login rights. Your data is as secure as any private or
even governmental data management scheme can get. In short, if hacked, your database will
always be completely useless to hackers or the competition simply because the
information any hacker will see will always be encrypted and locked
down.