GATEWIT have the best Asymmetric Cryptography for your Procurement Solutions. Any message (text, files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key. Contact us.
GATEWIT have a high availability clustering (24×7). This is a method used to minimize downtime and provide continuous service when certain system components fail. HA clusters consists of multiple nodes that communicate and share information through shared data memory grids and are a great way to ensure high system availability, reliability, and scalability. Contact us.
Passwords are the weakest part in your security. Passwords offer inadequate protection against cyber attacks, data breaches and fraud. GATEWIT strengthens security with adaptive multi-factor authentication (MFA) across Procurement Suite. Contact us.
Often times firewall email configuration blocks the information or some users do not see the important emails. To avoid these problems, GATEWIT can also send Short Message Service (SMS) transmissions to a telecommunications network to assure that supplier or buyer receives the message. Contact us.
Middleware technologies are employed to eliminate the pain of integration. A middleware solution is essentially a layer between GATEWIT Software and ERP (SAP, Oracle, Microsoft,…) that makes it easy for the two to communicate. It can be considered the glue that holds together applications, making seamless connectivity possible without requiring the two applications to communicate directly. Contact us.
“We use WeTenders to find new business opportunities internationaly and export our business.”
“Contract Management allows a demand and supply control obtaining a clear process of management.”
“We use GATEWIT Procurement Technology for our internal Supply Chain to help us create the next level of competitiviness in the market and engage efficiently with our suppliers.”
GDPR IMPLEMENTATION Data mapping GDPR: Each entity processes personal data differently and it’s difficult for most organisations to know where to start. To understand how the regulation applies to your organisation you need to understand which data you’re processing. You can’t protect personal data if you don’t know what it is, where it is and […]
On 22nd March, the Council of Ministers approved the following draft law: 1. The draft law implementing Regulation (EU) 2016/679 on the protection of individuals with regard to the processing of personal data and on the free movement of such data was approved in the national legal order. Through this law, the Government approves the […]
New technologies are presenting promising opportunities for improvement across the supply chain. Here’s how autonomous robots and drone aircraft are poised to change the game. As technology and autonomy continues to improve and prices decrease, the question is no longer whether autonomous robots will find a way into the supply chain of the future, but […]