Entrypoint includes a variety of features that yield the high level of security critical for today's businesses. Its built-in security features let you create a customized, fine-grained security policy specific to your needs.
Entrypoint stores all data in an SQL database, which provides an additional level of security—database logins, passwords, and even built-in encryption—not available with the flat files used in other data entry systems.
128-bit encryption protects all messages sent to or from the server, and provides significantly greater protection than 40-bit encryption.
Entrypoint System Administrator tools let you manage user access to the Entrypoint system. You can control access to different parts of the system by user or user group, and grant access to individual modules, batches, batch utilities, and reports.
Entrypoint comes with three default security groups for administrators, managers and operators. You may not need to add any other groups. Managing access by group reduces the implementation of even complex security policies to the simple task of reviewing, modifying and perhaps adding a few more security groups. You can then assign the appropriate security groups to user profiles, eliminating the tedious task of assigning individual access privileges to users one by one.
Access to Entrypoint
You define access to Entrypoint by assigning access attributes. Since there is an attribute for each action, access can be defined down to the granular level.
The Entrypoint default Administration security group is set up with access to all activities, including monitoring, user and security group setup and batch group and folder configuration, as well as batch access and data entry. Other administrative security groups can be configured if necessary.
Security groups and user profiles can be configured to define which users can close, export, or delete batches, change batch status, or change batch passwords. In addition, you can limit access to the Entrypoint batch utilities for comparing, revising and importing batches.
If different groups of users perform different data entry functions, they can be assigned to security groups that permit only those functions that they are responsible for. Users can also be restricted to accessing only those folders they need for their work.
Access to individual fields can be restricted by assigning access level numbers; operators whose profiles do not have higher access numbers than the access level for the field cannot access the field.