arrow_upward arrow_upward

Main functionalities of the application

Complete tasks handling done by field employees
Route planning and optimization

The application verifies in a map the locations of the all visits planned for the current day and optimize the route. The list of tasks made can be viewed and handled directly with the information about the address and location.

Visits handling

Downloading and reviewing all tasks to handle by employees working outside of their office. Handling and reporting different tasks and surveys defined by manager.

Work control

Constant monitoring of field employees actions in respect of current task handling.

Instant messages sending based on templates

The text message, e-mail or document – is done very quickly and saves time thanks to the functionality of build-in templates. Message is sent immediately because all data is filled in automatically.

Result reporting

Simple reporting of field visit completed with all required information and actions (taking photos, completing surveys, registering GPS position). The report is sent to the Manager desktop.

Work results evaluation

The field employees’ work is evaluated based on task handled in field and route travelled.

Selected advantages of implementing the solution

Up to 20% higher effectiveness of the field employees, due to possibility of planning and optimization of routes together with easy task reporting.

Much shorter business process thanks to the on-line access to actual data during field tasks handling and instant reporting once the task is completed.

Employees security and control thanks to their location and route travelled monitoring.

Significant cost reductions thanks to employees accounting based on the visits done and routes travelled.

Personal data protection achieved through the encrypting and controlling of access; full auditability of access according to GDPR requirements.

Security of the personal and financial data

Protection of the information available in the application is a key for us and we treat it as a complex work. We also provide full auditability of the access to data.

The OWASP/MASVS 1.0, level 2 requirements add remove

The VSoft Mobile Workforce supports the security of data and user based on the global standards of the Open Web Application Security Project. Both administrator application and mobile application are secured according to the requirements of the ASVS 4 and mASVS 1 at the level 2.

Data encrypting add remove

The communication between the application and server is encrypted thus no one will see what kind of data is send or downloaded. Effective distortion of your data makes it impossible to be used by third party. The SSL keys also authorize the connection between mobile application and server ensuring authenticity of the source.

Two factor secured access add remove

Thanks to the additional verification in the process of new user registration, if one of the elements of login are being stolen, the third party will not get the access to your data.

Access and events logs in the system add remove

All events taking place in the system (including log in) are registered and shown in a form of administrative logs. This allows for constant monitoring of users activity, as well as verification of possible undesirable attempts to access the application.  From the desktop of administrator it is possible to verify how application works and diagnose a cause of errors.

Personal data deleting and anonymization add remove

The application has the mechanism of the personal data anonymization according to the current law. Anytime, the administrator can call for the current scripts, which will permanently anonymize all personal data stored in a database.

The Latest Release Overview

New Release Q2 2021
New functionalities!

Ready to see how user feedback is driving VSoft Mobile Workforce development?

Yevheniia Zakharova, Business Development Specialist at VSoft, presents the latest functionalities awaited by field service teams and their managers.