- Subscription to the AI-powered virtual assistant can be made as part of an active Talligence subscription or as an add-on. Users can include the virtual assistant as part of their premium plan or opt for an additional subscription to enhance their Talligence experience. Users are encouraged to contact a Partner listed on the Talligence website for more information on subscribing to the AI-powered virtual assistant.
- Yes, users can request features by filling out the contact form on our website. The feasibility of adding requested features depends on their complexity and the number of user requests. The development team reviews feature requests weekly to plan future tasks.
- Retrieving data from Talligence may not yield complete results, as only limited data is synced from Tally® for display on the mobile app. Additionally, no database is stored on the server for data retrieval. Data decryption keys are stored only on mobile devices, preventing reverse data retrieval. As an added security measure, data recovery from Talligence is not provided.
- To connect Tally® on the cloud with Talligence, users need a static IP address and fixed port number provided by their Tally® service providers. These details enable seamless communication between Tally® on the cloud and Talligence for data synchronization.
- Absolutely! We prioritize the security of your data above all else. Our architecture is meticulously designed to ensure that your Tally® data and any data transferred to the cloud remain safe and protected. We adhere to industry best practices for data security, implementing robust measures to safeguard data while at rest and in transit.
- The Talligence connector is a standalone SaaS solution that can be seamlessly integrated into your organization’s infrastructure. It establishes a secure connection to your Tally® server using the Open Database Connectivity (ODBC) protocol, enabling data exchange between Tally®. ERP 9 and other applications in a secure manner. Through encrypted channels, the Talligence connector securely transfers your Tally® data to our cloud environment, ensuring the confidentiality and integrity of the data throughout the process.
- Our web portal is engineered with a strong focus on security to provide you with a comprehensive and agile analytics solution while maintaining the highest protection standards for your data. We employ application-level security measures that empower administrators to exercise granular control over access to BI applications based on user roles or individual user permissions. This includes a role-based menu system that tailors menu options according to user roles, enhancing usability and security. Furthermore, our portal features robust application activity auditing, which meticulously logs end-user activity for enhanced transparency and accountability. Administrators can manage access to Talligence on mobile devices, ensuring that only authorized devices can connect via our native mobile app, further bolstering data security.
- Data accessed through Talligence mobile apps is delivered exclusively through our native mobile app, providing an additional layer of security. Access to data is strictly controlled by administrators, who authorize specific users and devices through a rigorous authentication process involving One-time Password (OTP) verification. This stringent authentication mechanism ensures that only authorized users can access your Tally® data on approved mobile devices, safeguarding your data against unauthorized access.
- No, your data remains strictly confidential. We do not access your data at any point. Using encrypted communication channels, the Talligence connector autonomously syncs your Tally® data to our secure cloud servers. Data processing and analysis are performed solely by advanced analytical tools, ensuring the privacy and integrity of your data without external interference.
- Yes, our permission system offers customizable access controls that empower you to grant limited access to users based on your specific requirements. You can assign restricted permissions to users, allowing them to access only the dashboards and reports relevant to their organizational roles and responsibilities. This granular control ensures that sensitive data remains accessible only to authorized personnel, safeguarding your data privacy.