izidocs Document Management Solution helps you manage and protect your company’s information, including Microsoft Office documents, scanned documents, and emails. It is provided as a cloud service or installed on premise.
You can access izidocs from anywhere, using any browser. A simpler mobile interface is also available.
izidocs integrates with your other solutions, such as ERP and CRM. For example users can open izidocs folders directly from your CRM. Or, add retrieve documents using the API. Open a standard set of subfolders every time you have a new client, to make filing and retrieving documents easier. Protect your information by applying different access rights to each subfolder automatically.
Import your documents and folders using drag and drop. Connect your copiers and scanners, as well as your 3rd party scanning suppliers, to scan documents directly to izidocs.
Izidocs offers an array of features:
Documents can be filed in multiple folders.
For each document you can specify its characteristics like name, from, to, dates, document type, etc.
You can search and find documents using these characteristics, or by conducting a Google like keyword search.
PDF tools allow you to add, remove, or replace pages.
Certain documents can automatically be displayed on your intranet or portal.
You can edit documents using the native application, for example Microsoft Word. When you save your changes, a new version is uploaded to izidocs automatically.
You can create documents from templates that are easily created using Microsoft Word Mail Merge. These documents can include data that comes from your CRM, or your ERP. You can also add a QR code, which helps you file signed and scanned documents automatically.
Do you process personal data? Do you keep documents of any format? Are they stored on file servers, or user devices? Are you worried about security, or compliance?
izidocs is the answer to your compliance and security needs.
Ensure compliance by:
Recording all document versions, and all user actions, including view.
Encrypting data at rest and in transit.
Setting up retention and destruction policies.
User authentication is via Active Directory, or username and password, with password policy.
You can limit access to specific IP addresses, and use two-factor authentication.
Access rights are set up per folder and subfolder, and include:
Create,
Edit,
View,
Move,
Delete.
They are defined per user, group and role.
You can also give time limited access to specific folders.
We look forward to talking with you about your digitalisation needs, about improving your office efficiency, and about protecting your documents.
Информация по комментариям в разработке