



















Repair & Maintenance
From a full financial solution to a Service Center to ensure efficiency and profitability.

Repair & Maintenance

From a full financial solution to a Service Center to ensure efficiency and profitability.




Financial Management
- Pending Inventory Handling & Reporting
- Financial Statements & Cash Flow
- VAT Settlement & Invoice Bank
- Import & Item Cost Allocation Management
- Multi-level File Structure
- Multi-currency Management
- Multiple Segments/Cost Centers
- General Ledger

Financial Management

- Pending Inventory Handling & Reporting
- Financial Statements & Cash Flow
- VAT Settlement & Invoice Bank
- Import & Item Cost Allocation Management
- Multi-level File Structure
- Multi-currency Management
- Multiple Segments/Cost Centers
- General Ledger

Sales & Marketing Management
- Customers
- Price Management
- Sales Voucher Integration
- Invoice Settlement
- Sales Force Management
- Proforma Invoices
- Analytical Sales Reports
- Customer Segmentation
Sales & Marketing Management

- Customers
- Price Management
- Sales Voucher Integration
- Invoice Settlement
- Sales Force Management
- Proforma Invoices
- Analytical Sales Reports
- Customer Segmentation
Purchases, Inventory & Warehouse Management
- Height, Width & Length Item Management
- Item Segmentation & Reporting
- Purchase Cycle Workflow
- Multiple Warehouse Management
- Barcode Management
- Inventory & Location Management
- Ending Inventory Evaluation
- Purchases Reports

Purchases, Inventory & Warehouse Management

- Height, Width & Length Item Management
- Item Segmentation & Reporting
- Purchase Cycle Workflow
- Multiple Warehouse Management
- Barcode Management
- Inventory & Location Management
- Ending Inventory Evaluation
- Purchases Reports
Cyber Security & Access Rights
From a full financial solution to a Service Center to ensure efficiency and profitability.

Cyber Security & Access Rights

From a full financial solution to a Service Center to ensure efficiency and profitability.

Access Rights Security
Users are organized in a tree fashion similar to that of the company’s administrative tree, and each user can be assigned specific access rights on any option, module and functionality in the system.

Advanced Security
Permitting authorized users’ access in permissible fields and sub-fields. By defining criteria and rules per voucher or record field; providing a high level of user access control.

Station Login Security
In addition, to usernames and passwords, a security option is defined for permitting specific stations to access the system.

Password Security
Controls for assigning password strength and requests to change it periodically.

Login Schedule
Definable time schedules to permit users to log in to the system at specific schedules or times.

Document Printing
User-defined document printing options allowing or denying access to print and post vouchers.

Electronic Signatures
Assigning required signatures for approvals per voucher based on criteria and rules for fields such as voucher amount, branch, department and/or supplier.

Control Dates
User-defined set of controls for data entry security and control. These controls guarantee unintentional data entry that will affect audited or submitted reports.

Two-factor Authentication
A two-factor authentication for additional optional security that sends an SMS to the mobile number defined in the user’s file.

Third Party Login Options
A feature that allows users to incorporate verified third-party applications as a login option to the ERP system.