Security and control

Selected functionalities
  • Encrypting connections using cryptographic methods – SSL and the possibility of setting the password by the administrator (its length, use of signs and expiry date)
  • Multiple access modes with the possibility of consolidation and standardization
  • Access modes (roles) defined in organizational forms
  • The privilege of the “super-user”
  • Login monitoring and every user step in the system
  • Archiving the history of events with individual records


  • The mentioned safeguards are the most effective and thus the most difficult to overcome
  • The type of database, (brand) of the system does not matter in the context of the above-mentioned security