|
|
e2B is equipped with a highly
sophisticated security mechanism making
unauthorized access into your data impossible.
With its Data Encryption feature, any access
to the data are well secured. Access to data
is closely monitored and traced. Our primary
concern is to protect all your information with
utmost confidentiality.
|
|
|
|
User Authentication
|
|
Users are required to use a log in name
and password to access e2B. They
can change their passwords anytime they
like once logged in successfully. After
three failed log in attempts, the system
will lock down on them and can no longer
continue, thus unauthorized access is
virtually impossible.
|
|
|
Secured Socket Layer
|
|
Data is scrambled and encrypted as it is
uploaded to e2B. It goes through
a Secured Socket Layer or SSL.
|
|
|
Comprehensive Audit Trail
|
|
Every user's activity, be it time he/she
logged in, what he/she did, time he/she
or logged out, etc. will be registered and
monitored on a log file.
|
|
|
Time & Date Restriction
|
|
Users can be restricted to access e2B
System on a specified time and date.
|
|
|
Holiday Restriction
|
|
Users can be restricted to access e2B
System during holidays.
|
|
|
Machine Restriction
|
|
Any terminal or PC can be blocked by the system
thus restricting users to use the blocked terminal
to access e2B System.
|
|
|
Multiple Users
|
|
e2B System can accommodate multiple
users such as Administrators, Managers, customer
service personnel, users, clients, and guests
all at the same time.
|
|
Return to previous page
|