Lite | Pro | |
---|---|---|
Cloud ERP | ✔ | ✔ |
Check Reading | ✔ | ✔ |
Control Dates | ✔ | ✔ |
Password Security | ✔ | ✔ |
Station Login Security | ✔ | ✔ |
Access Rights Security | ✔ | ✔ |
User-friendly | ✔ | ✔ |
Multiple Year Reporting | ✔ | ✔ |
Macro Recorder | ✔ | ✔ |
Record Cloning | ✔ | ✔ |
Split Views | ✔ | ✔ |
Truly Multilingual System | ✔ | ✔ |
Filtering Capabilities | ✔ | ✔ |
Drill Down Functionality | ✔ | ✔ |
Integration | ✔ | ✔ |
Export Reports | ✔ | ✔ |
Advanced Search Functionality | ✔ | ✔ |
Advanced Security | ✔ | |
Multiple Unit Tracking Per Item | ✔ | |
Multiple Warehouse Management | ✔ | |
Price Management | ✔ | |
Customer Segmentation | ✔ | |
Prepaid & Accrued Expenses | ✔ | |
Multi-level File Structure | ✔ | |
Multiple Segments/Cost Centers | ✔ | |
Import Data & Reports | ✔ | |
Email Integration | ✔ | |
Document Printing | ✔ | |
Login Schedule | ✔ | |
User Preferences | ✔ | |
Multiple Users Definition | ✔ | |
Barcode Reading & Printing | ✔ | |
QR Code for Delivery Location | ✔ | |
Full Audit Trail | ✔ | |
Customized Views | ✔ | |
Bank Transfer Forms | ✔ | |
Check Printing | ✔ | |
Sending SMS | ✔ |
Bisan ERP Trade & Industry
A reliable and comprehensive yet scalable ERP solution for small, medium and large sized enterprises servicing a wide range of business sectors from service oriented to large industrial establishments. Bisan ERP offers customized modules for vertical sectors, providing the ultimate solution for your daily business activities anytime and anywhere.
Bisan ERP Trade & Industry
A reliable and comprehensive yet scalable ERP solution for small, medium and large sized enterprises servicing a wide range of business sectors from service oriented to large industrial establishments. Bisan ERP offers customized modules for vertical sectors, providing the ultimate solution for your daily business activities anytime and anywhere.
Financial Management
- Multiple Segments/Cost Centers
- Multi-currency Management
- Accounts Receivable & Accounts Payable
- Full Banking & Checks Management
- Automatic Depreciation Calculations
- Import & Item Cost Allocation Management
- Financial Statements & Cash Flow
- General Ledger
Financial Management
- Multiple Segments/Cost Centers
- Multi-currency Management
- Accounts Receivable & Accounts Payable
- Full Banking & Checks Management
- Automatic Depreciation Calculations
- Import & Item Cost Allocation Management
- Financial Statements & Cash Flow
- General Ledger
Sales & Marketing Management
- Sales Force Management
- Proforma Invoices
- Sales Voucher Integration
- Price Management
- Analytical Sales Reports
- Customer Segmentation
- Invoice Settlement
- Customers
Sales & Marketing Management
- Sales Force Management
- Proforma Invoices
- Sales Voucher Integration
- Price Management
- Analytical Sales Reports
- Customer Segmentation
- Invoice Settlement
- Customers
Purchases, Inventory & Warehouse Management
- Purchases Reports
- Inventory & Location Management
- Serial/Batch Expiry Date Tracking
- Ending Inventory Evaluation
- Multiple Unit Tracking Per Item
- Barcode Management
- Item Segmentation & Reporting
- Height, Width & Length Item Management
Purchases, Inventory & Warehouse Management
- Purchases Reports
- Inventory & Location Management
- Serial/Batch Expiry Date Tracking
- Ending Inventory Evaluation
- Multiple Unit Tracking Per Item
- Barcode Management
- Item Segmentation & Reporting
- Height, Width & Length Item Management
Cyber Security & Access Rights
Securing your data with the best cyber security measures, including role-based access, strong encryption, robust password policies, two-factor authentication and more.
Cyber Security & Access Rights
Securing your data with the best cyber security measures, including role-based access, strong encryption, robust password policies, two-factor authentication and more.
Access Rights Security
Users are organized in a tree fashion similar to that of the company’s administrative tree, and each user can be assigned specific access rights on any option, module and functionality in the system.
Advanced Security
Permitting authorized users’ access in permissible fields and sub-fields. By defining criteria and rules per voucher or record field; providing a high level of user access control.
Station Login Security
In addition, to usernames and passwords, a security option is defined for permitting specific stations to access the system.
Password Security
Controls for assigning password strength and requests to change it periodically.
Login Schedule
Definable time schedules to permit users to log in to the system at specific schedules or times.
Document Printing
User-defined document printing options allowing or denying access to print and post vouchers.
Electronic Signatures
Assigning required signatures for approvals per voucher based on criteria and rules for fields such as voucher amount, branch, department and/or supplier.
Control Dates
User-defined set of controls for data entry security and control. These controls guarantee unintentional data entry that will affect audited or submitted reports.
Two-factor Authentication
A two-factor authentication for additional optional security that sends an SMS to the mobile number defined in the user’s file.
Third Party Login Options
A feature that allows users to incorporate verified third-party applications as a login option to the ERP system.