- Confidentiality: The system information is not available to anyone other than the person for whom originally intended. In order to ensure confidentiality AIMMS uses encryption techniques and control access level by maintaining respective lists.
- Integrity: The system protects migrant information from unauthorized alterations. Any information is retrieved in exactly the same form in which it was initially recorded by technical encryption and error detection code to the data.
- Availability: The information and general system resources are continuously available for the “authorized” users of the system, due to the embedded protection against commonly used attack techniques such as SQL injection, session hijacking, cross-site scripting, etc.
Users can choose among four (4) languages currently supported by the application, improving the user-friendliness of the system.
Centralized management capability of a company / group, whilst allowing the independent operation of each unit.
Full adaptation of the system to the personal needs of each user by means of flexible individual configuration screens and reports, adding entities and defining rights and roles.
Supported by all operating systems
The application works in all known Web browsers (Chrome, Mozilla Firefox, Internet Explorer, Safari, Opera, etc.).
The multi-level application design, based on internationally accepted standards, allows addressing the increased traffic load in a simple way, without any reduction in the speed of the application and to the overall user experience of the system.
The system architecture allows the user to choose only the modules of the system needed to meet the company’s procedures.