Security You Can Trust
For our tool, we use a comprehensive, scalable, and flexible framework of prescribed security controls in accordance with NIST and HITRUST CSF requirements and standards applicable to ISO, PCI, COBIT, FISMA, and NIST as well as HIPAA and HITECH regulations.
Security is our top priority.
That’s why we use Projexis™.
We leverage the secure, scalable, disaster recovery capable Amazon Web Services Architecture (AWS).
Projexis has the capability to create a customized document structure to manage procurement contracts, performance measures, compliance, technical assistance, and closeouts. With unlimited storage capacity, users manage and retrieve documents with logic capabilities, search parameters, and document category properties.
Ease Of Integration
Import and export program data using bulk updates, or by direct connection to other systems through standard API protocols such as SOAP, or REST that can be configured to exchange data seamlessly.
Projexis is easily configured to implement system-of-record rules down to the field level to ensure integrity of data and captures all integration actions within the audit log.
Projexis integrates with estimating software, including WinEst and Xactimate, project scheduling software, such as MS Project and Primavera P6, and common and proprietary enterprise resource planning (ERP) systems.
Dedicated Technical Support
Our full-time helpdesk team is available to respond to user access requests, problems, user guidance, data access requests, user access issues and other user-facing problems.
Easy Account Creation
Quick and efficient account creation for applicant, cases or users. Dynamic account utilization with system notification integration.
- net 4.5 frameworks using C#
- MVC 6.0
- Angular for side scripting
- Responsive theme for mobile and tablet use
- Petapoco for ORM
- SQL Service 2016 rational database
- Multi-tier decoupled architecture for security and scalability
- Completely separated code base and data exchange via JSON driven API
- One-way password encryption using hash and salting
- Row-level encryption of PII