- Software built on web-based technology can be deployed well on both LAN and Internet.
- Access authority: the ability to flexibly and restrict access via IP address or subnet.
- System log: records access log, error log generated.
- The system supports secure communication standards
- Data encrypted using MD5 algorithm
- The mechanism of periodic data backup and recovery helps minimize data risks.