Categories

Products

Atlas, News, Products

Atlas Release

In June, the launch of the Atlas was held in Lisbon and Leiria for some guests. It was possible in this event to present the new functionalities of the product and how these allow to facilitate the construction maintenance of...

RPA (Robotic Process Automation)

End-to-end Analytic Solutions for faster and better business decisions Edoclink Capture module, integrated with Kofax software, allows the dematerialization, processing and registration of all documents received, as well as the definition of different typologies of document capture with the implementation...

Project Portfolio Management (PPM)

Managing your Organization transformation through Project Portfolio Management Atlas allows the configuration of bidirectional relationships between transformation projects and architecture elements. In one hand, the project planning requires the observation of the organization expected TO-BE state, given that the AS-IS...

Application Portfolio Management (APM)

Continuous Management of the Organization Application Portfolio In Application Portfolio Management (APM) configuration, Atlas allows to: Publish surveys to business users which result in business analyses; Publish surveys to the technical team for quality assessment of each solution; Solution structure...

Enterprise Architecture (EA)

An insight into the current and emerging architecture of your Organization The key aspects of Atlas regarding EA are: Effortless maintenance; Simple and common language between stakeholdersusers; Time Travel Moreover, Atlas also supports: Friendly and simple architecture blueprints generation; Navigation...

Meeting Management

Edoclink Meetings allows you to manage meetings by following all its phases. Edoclink Meetings allows the management of meetings by following all its phases.   The module has the following components: Meeting preparation; Elaboration and dissemination of the agenda; Managing...

Security in access to information

Information security is guaranteed at storage (through data encryption), integrity and tampering (checksums and digital signatures are used) level and at authentication level (with a wide access control configurable by users and / or groups and by type of information)....