Built over decades to thrive in demanding operational environments, TRM enables deployment for even the most complex enterprises and challenging use-cases.
Configure TRM access with comprehensive module, form, table, field and report permission-based User Security Roles, and assign to all System participants. Assign roles by workforce and customer types/attributes, and TRM automatically re-assigns roles when attributes change: example, an employee job change, or a new customer, partner or affiliate onboard.
Regulatory-compliant Non-Public Information is encrypted within the System, and masked in the user-interface. API integration is permission-enabled. Data field access governed by strict User Security Role assignments. Comprehensive transaction audit-logging.
End-users experience only the menus, modules, sub-modules, forms and fields that they have been explicitly permission-granted. User field inputs are validity-filtered. TRM's browser URL is masked, blocking related vulnerabilities. Log-in access with two or three-factor authentication.
Certainty Systems. A Better Way to Build.
Silicon Slopes • Newport Beach • London
Copyright © 1994-2023 Certainty Systems - All Rights Reserved.
A Member of the Certainty Systems Group
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.