To achieve your goals, our team of business analysts experts helps you to define rapidly the scope of your needs in order to configure the best marketing worklfows based on your company best practices
We provide in collaboration with your team, a clear picture of your existing situation highlighting the source of quick improvements that our solution provides.
This work takes into account the following environment :
The outcome of the analysis is a bespoke roadmap fitting perfectly your needs to lead your team to successfully use agility and meet your marketing goals.
The use of APIs is not only required for the integration of external solutions like the apps from agility’s constantly evolving apps catalogue or communication with external data sources or legacy systems (ERP, CRM, Financial System) but is also a base component of agility’s own system architecture.
In order to allow for a continuous evolution which requires easy system improvements and enhancements, Agil Technologies has opted for a systematic separation of the user interface (UI) from the underlying backend layer that implements the required business logic and related services. As such, the UI focuses wherever possible only on data presentation, connecting via the internal API to the backend services.
Based on the internal API, Agil Technologies has published the majority of its API routes to allow external programs to interact with the agility marketing collaborative platform for managing some of the internal agility entities eg. via CRUD* operations or for retrieving reporting data.
Like for UI operations, API access is governed by agility’s granular user access management layer to ensure in addition to best practices for securing Internet communication the required level of security to protect our clients’ data.
Outsourcing software as a service (SaaS) puts control over your application and data in our hands. We at Agil Technologies are conscious of this trust our clients put in us and our services. In order to deserve this trust, we apply relevant industry security standards and best practices in order to provide and continuously improve the level of service your business needs and to ensure your data is safe and well protected.
We enforce HTTPS for all UI and API communication to encrypt your data in transit. As for the storage of your database, we encrypt by default a base set of sensitive data and allow for custom configurations to extend the scope of data encryption based on customer specific requirements.
In order to protect our client’s user credentials, we apply salted password hashing and eliminate any access to the password, even for our own support staff. The required password policy can be set according to your existing standards. Authenticated users can be granted granular access rights to avoid also internal security breaches.
As for API access, the same rules apply as for normal users, but password access is limited to read-only operations. Any data manipulation relies on a sophisticated multi layer authentication, using to token, digests and digital signatures.
Agil operates its services using industry proven cloud hosting provider Amazon Web Services (AWS). As such, we trust their recognized leadership with regards to security; please see http://aws.amazon.com/fr/compliance/ for more details on AWS’ compliance regarding security and data protection .
For more details on how manage at AGIL security, business continuity and data protection, please request our security policies guide.
For more details on how manage at Agil Technologies security, business continuity and data protection, please request our security policies guide.
The main objective for integrating apps into the agility platform is an optimized user experience. It should be possible to use an external solution without leaving the platform and following Agil Technologies UX and design guidelines to make the switch to such a solution as seamless and painless as possible for a user of our platform.
192 Avenue Pierre Brossolette,
92240 Malakoff, France
+33 (0)1 83 81 87 67