Download presentation
Presentation is loading. Please wait.
1
Documents. Process. Data. Payables
WE ARE AUTOMATION Documents. Process. Data. Payables
2
Driven by Commitment, Service, and Quality
We’re driven by our principles of commitment, quality and client satisfaction. It is from these principles that our technology solutions are constantly evolving, allowing us to continually drive best-in-class innovations across our entire client base. We’re committed to maintaining our position as an invaluable long-term resource for our clients, and look forward to leveraging our passion and enthusiasm as we continue to envision and develop business-driving technology solutions and services. Founded as an IT Services company in 1998 Expanded to web-based SaaS model in 2006 Headquartered in Dallas with a regional office in Chicago Over 500 highly skilled employees across US and India
3
A Suite of Options, All In One Place
At Circulus, our goal is to provide our clients with product and service offerings designed to optimize, augment and automate their business. Extending far beyond simple web portals and outsourcing, we approach solutions with a larger view of your business in mind.
4
This is a very good program and our customers love it.
Take The Pain Out of Payables Finally, AP Automation Is Simple, Powerful and Affordable Manually paying business bills is a thing of the past. Circulus SMB can severely reduce time spent finding, entering, and paying bills – all at a price you’d think was a blast from the past. Flexible Bill Pay Options QuickBooks Integration Powerful AP Workflow AP Reporting Suite This is a very good program and our customers love it. -Apps.com
5
Redefining The Role of Corporate AP
From Standard Procedure to Strategic Powerhouse Document Management and Data Extraction User Access and Control Robust Workflow and Business Rules Integrations
6
Our Team Is Your Team Entirely Configurable. Absolutely Scalable. Totally Doable. Your business is packed with policies, procedures and workflows, many of which require manual intervention. Our non-invoice BPO solutions take advantage of both technology and outsourcing to create powerful automation engines. Our methodology allows for scalability of even the most complex business rules and workflow needs. And by integrating with your existing ERP, our automation capabilities can operate seamlessly with your organization. Document Collection Data Extraction Workflow
7
Security and Peace of Mind
We don’t take your security lightly, and have taken steps to make sure that our product utilizes only the best-in-class tools and procedures. Authentication and Access Control We have a formal, documented process for granting and revoking access to all systems that process, store or access client’s sensitive data. We enforce complex Account & Password policies. We incorporate multi-factor authentication for remote network access originating from outside the network. We disable all media and USB ports on local systems. Network Security We can setup secure point-to-point VPN tunnel between our India office network and client’s network. We use software and hardware based tools/techniques to detect and prevent intrusions into the network. We implement stateful-inspection and DPI firewalls. Vulnerability Management We have a documented patch management and distribution process that ensures all system components and software are protected from known vulnerabilities. We perform yearly internal and external vulnerability testing by a qualified third-party. We deploy anti-virus and anti-malware on all systems commonly affected by malicious software. Security Awareness Training We ensure all users receive regular security awareness training. Auditing We implement centralized logging for system/network activity. We use strong encryption, cryptography, and security protocols to safeguard client’s sensitive data during transmission over open, public networks. Physical Access We employ physical safeguards and visitor access controls (card and biometric) to prevent unauthorized access to all systems used to process or store client’s sensitive data. We have video monitoring at all ingress/egress points, we maintain the videos up to 60 days. Recruiting We do third-party background verification (including drug test and criminal check) before hiring fulltime employees All our offshore resources are fulltime employees. ----- Meeting Notes (2/16/17 17:52) ----- Authentication and Access Control Network Security Vulnerability Management Security Awareness Training Auditing Physical Access Recruiting
8
Documents. Process. Data. Payables
WE ARE AUTOMATION Documents. Process. Data. Payables 2701 Dallas Parkway, Ste 550 Plano, TX 75093
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.