Our features
Functions that make it easy for you to complete your responsibilities. Using process eye features, you may design digital instructions and inspections specifically suited to your unique processes and requirements.
Uniqueness
Multi-device
Process eye works with smart phones, smart glasses and tablets
Offline workflow execution
Ensure task compliance in low or non-connected areas
Paperless reports
Check, download and send all your reports in PDF
Image recognition and machine learning
AI-powered functionality simplifies tasks
Use it on any device
Use our software with smart glasses, phones or tablets
On-premise availability
Keep your data on our servers or your own
How does it work?
Connect to cloud-based processes to have all data synchronised and prepared for simple instructions and image-based follow-up.
You may automatically make reports and track all your activities by capturing images.
Follow the workflow step by step.
The process designer establishes the right workflow.
​
New users experience a customized demo that guides them through the whole sign-up process, product activation, and first use of Process eye.
The front-line workers carry out the steps.
​
Supervisors and users need how-to instructions to do their complicated and varied tasks. To produce AI-based custom reports and alerts, we work with customer success teams to support operations.
Adaptive Support
​
If you require assistance, we can help you with any queries you may have about our solutions, troubleshooting any problems, managing account activations, and general management.
Security
We secure your information by using proper policies, practices, procedures, organizational structures, and software functions as controls. We make three daily backups of all your data. Each backup is stored on distinct servers from different providers for maximum data security.
Backup and Encryption
All data transmissions employ Transport Layer Security (TLS) 1.2 encryption. Sensitive data and other metadata are secured with AES 256-bit encryption at rest when they are uploaded into our applications.
All of your data is backed up three times every day by us. For maximum data security, each of them is stored on distinct servers from many providers.
Cloud Services
Our servers are hosted on AWS since they are ISO 27001, 27017, and 27018 certified and are an AICPA SOC 1, SOC 2 type 2, and SOC 3 authorized service provider.
We hold ISO 27001 accreditation. We achieve our information security by putting in place a suitable set of controls, such as policies, and practices.
On-premises model is also an option.
Firewall
In addition to AWS security, antivirus and system firewall, we also use Trend Micro Cloud One - Workload Security (DSaas) as Wideum's Intrusion Detection and Prevention System (IDS / IPS).