SITEONE TMS is a suite of applications, services and resources that together implement a flexible platform that powers your Remote Terminal Management business. Whether you are managing complete software updates, or configuring a single terminal or a bulk of terminal groups, SITEONE TMS makes it simple. It allows for efficient software download, parameter synchronization, problem diagnostics or estate information management, and scales from small to large installations with multiple communication servers. This powerful and dynamic management solution includes: .
The reporting service feature provides transparency to both your terminal estate and the payment system performance. TMS supports any ETFPOS terminal brands, including: PAX, Verifone, Ingenico, NewPOS, Spectra; as well as several peripheral devices such as PIN pads, contactless readers, and modem/ISDN modules.
SITEONE TMS updates the parameters of each specified module, one by one, without changing the structure of the application. This makes the updating process quite light and fast.
It employs an encrypted application programming interface to communicate with devices via XML, through micro data packages for remote updating, which allows the system to work with unstable connections such as Dial-up or GPRS.
The aforesaid interface permits the device initialization, and it does not require the financial application kernel to be modified. The host point of sale (POS) must use the API to download the parameters.
Furthermore, the implemented security protocols are configurable in the interface.
SITEONE TMS has a module on which user roles are created and permissions are assigned to each user account.
The permission module allows administrators to modify editing and visibility properties of any object in the interface (windows, buttons, text boxes, links and menus).
TMS allows the creation, management and assignment of roles, plus the authorization of each user that has access to the system.When a user logs in, the system displays the profile picture and IP address of the logged user so that the users' passwords do not get interchanged. Moreover, it is possible to log in with chip or RFID cards.
The system provides a unique KEY for each connected device. To that end, TMS employs an interface that generates a HASH based upon the hardware, software and network values of each device. Thus, if the core components of a associated device are replaced, such as the CPU, hard drive, network interface card or the OS, the system will consider such device as a new one and it will require a new authorization. Each transaction carried out on a connected device validates the integrity and registration of its KEY.
Each transaction generates a log file containing the data, related to the user and the device, that is being processed at the moment of the transaction. Each POS that interacts with the system originates a log file, and based upon the activities contained in such log, security alerts can be raised and configured.
With TMS, completed changes are replicated in real-time and can be unattendedly accepted by the device.
Additionally, the system enables the download of new characteristics, such as new issuers, EMV keys, EMV app, toward multiple devices that are working unattendedly.
It also includes the possibility to deactivate functions and immediately block the device in case of theft.
It allows the creation of update tasks on the basis of schedules and events.
Plus, parameter lists are completely modifiable.
The platform uses an interface that creates update codes for each connected device, which enables administrators to syncronize only the parameters that can be updated in real-time without needing to download a new app, version or the entire configuration of the POS.
This module allows the interaction between TMS and the device update tasks, in order to upgrade the entire application or its kernel, regardless the device manufacturer.