Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Our innovative cloud-based solution features top-tier security measures that not only lower your costs but also ensure your peace of mind. This unified platform fosters organic growth by leveraging our extensive library of open APIs, robust functionality, and comprehensive reporting features. For over four decades, ACI has been at the forefront of electronic payment processing for businesses globally, supporting more than 5,000 banks and enterprises across over 80 nations. Our digital banking solution, Universal Online Banker, enables banks to execute both domestic and international transactions while accommodating various payment types. We are committed to continuously enhancing our payment options to ensure future-proof functionality. Additionally, we provide information tailored to your customers' needs, including customizable reports on balances and transactions. Our features also encompass panel authorization, cash pooling, and a wide array of global payment solutions, making it a versatile choice for financial institutions. With such diverse capabilities, our platform is designed to meet the evolving needs of the banking sector.

Description

The :Foundation Client is lightweight and operates with minimal system resources, functioning seamlessly in the background while responding to user actions. Users can access the interface to list managed resources, check reports, or, if they have Administrator privileges, manage Users, Service Components, and Organization resources. This client facilitates user interactions by sending secure requests to KODiAC Cloud Services, while also integrating workflows for end-user applications. With the :Foundation Client, users need not worry about the complexities of manual processes such as decryption, re-encryption, and authentication, as it simplifies encryption into a user-friendly experience. Users can easily navigate through the managed items, explore enumerated Version Instances or their Managed Data Archive, restore content, and obtain Usage Reports, all while having the capability to safeguard extensive data sets – all through a consistent set of User Interface controls, accessible to all Users regardless of their organizational role. Additionally, the design ensures that even those with minimal technical knowledge can effectively utilize its features without any steep learning curve, promoting efficiency and ease of use across the board.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

IRI Voracity

Integrations

IRI Voracity

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

ACI Worldwide

Founded

1975

Country

United States

Website

www.aciworldwide.com

Vendor Details

Company Name

Definitive Data Security

Website

definisec.io/ssprotect-deployment/

Product Features

Payment Processing

ACH Check Transactions
Bitcoin Compatible
Debit Card Support
Gift Card Management
Mobile Payments
Online Payments
POS Transactions
Receipt Printing
Recurring Billing
Signature Capture

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Alternatives

Infiltrator Reviews

Infiltrator

Infiltration Systems
Ridgeback Reviews

Ridgeback

Ridgeback Network Defense