«CROSSSECURITY» SOFTWARE TO RUN YOUR OWN BLACKLIST


When investigating your contractors in «CrossSecurity» software you can use the built-in capabilities of creating and maintaining the blacklist. The blacklist allows you to organize your own list of stop-factors, filling it with information from different reference formats (the list of invalid passports, list of terrorists and other). «CrossSeсurity» software can also be configured to load to the blacklist your own references. The blacklist provides the tools for updating data, and also excludes individual entries from the list.

In «CrossSeсurity» software you can search among internal database of due-diligence inspections, and in other connected external resources and blacklist. The search can be conducted by minimum data set, and it will not prevent you to find the person, if it is blacklisted. The blacklist can be used for the detection of unscrupulous contractors, to identify fraud, to store information about untrustworthy people and facilitate search for them. You will always have a relevant blacklist that can be performed on the requests of the various units of your organization. Search in blacklist is a basic function of «CrossSeсurity» software and can be set to any point in the business process of verification and compliance procedures. Optionally, the blacklist database can be used as an independent resource to verify the data in the processes outside the «CrossSeсurity» software.

The results of search in blacklist can be represented in analytical report. Blacklist database, as «CrossSeсurity» itself, supports the possibility of receiving automated requests to perform verification from other software using the API-function.
  Reckoner

THE BENEFITS OF USING A BLACKLIST OF «CROSSSECURITY» SOFTWARE


CrossChecker Leasing  
  • Using a blacklist you can search immediately through the large amounts of data.

  • Automated search in all directories of blacklist will reduce the time spent on verification, and to optimize the workflow of your employees.

  • Strict delimitation of rights in «CrossSecurity» software allows you to be sure that the information in not modified from outside.

  • Intuitive software tools for update information in blacklist allow you to maintain information up to date.

  • The results of search in blacklist can be represented in analytical report.

  • You can perform verification from other software using the API-function of «CrossSecurity» blacklist.
     
     
     
     
Технические требования
TECHNICAL REQUIREMENTS
Detailed server requirements for installation and user's workplace
  Презентация
PRODUCT PRESENTATION
Colorful slides outlining the key features of the product and success story
  Технические требования
YOU MAY ALSO LIKE
Learn more information about «CrossSecurity» software