ExtraView is configurable to allow the creation of virtually any system with workflow and processes. We have extensive experience of customizing solutions for companies from small businesses to large global enterprises.
With ExtraView's unique architecture that allows the rapid development of any business process system, we can configure any issue-tracking system. This includes integration with your other enterprise software applications. Do not hesitate to contact us for more information.
Key Features
- Web-based - Standard web browser access with no client software to install. Unlimited number of role-based layouts, views, queries and options
- Point-and-click Configuration - Multiple forms or departmental business areas within a single database. Add an unlimited number of custom fields and an unlimited number of user roles
- Workflow Management - Workflow may be defined for each role, form and project. Simple workflow administration allows for the validation of data and processes
- Reporting – Create and save public or personal reports. Report types include: Column reports, Summary reports, Matrix reports, Dashboard reports, Aging reports, Container reports, Planning reports and Custom reports. Reports may also be output to the browser, to Microsoft Word, to Microsoft Excel, Adobe PDF, or text formats
- Electronic Signatures - Configure electronic signatures on any criteria, to provide reauthentication at the time of update, conforming with regulations such as 21 CFR Part 11
- Audit Trails – Changes to any field on a form are part of a full, visible audit trail. Each change is time stamped and annotated with the name of the person who performed the update. All changes to the underlying system metadata as well as all user access are also recorded in an audit trail
- Notifications - Automatic and rule based notifications. Alerts and updates can be sent and received through email. Reports can be scheduled and sent by email on a periodic basis
- Security - All fields are controlled with field-level security permissions for each role: read/write access, read-only access, no access. All key data collection functions are protected by a role-based security key. Definable password policies and expiration procedures. Electronic signatures may be defined for any step in the workflow. There is extensive control over all the application to prevent unauthorized usage.
|