5 strong arguments for our software
Outerscore is the perfect solution for companies that want….
New Experience in Managing SOWs & Contingent
‘Traditional’ vendor management systems mainly focus on common forms of contingent labor, including staffing suppliers and agencies. However 70-80% of the service spend (in value) in enterprises are typically SOW-based services and projects. Incumbent technology hasn’t kept up with the need for a user-friendly way to manage deliverable-, milestone- or unit-based service delivery.
Wheater you are aiming to manage temp workers, independent contractors, a large IT project, marketing agencies or a recurring outsourcing service fee: We offer an elegant, intuitive tool that makes services ‘shoppable’
Flexible, Modular Components
Business should be able to pick and choose whatever fits their business needs and budget, instead of being forced to use redundant software components. Outerscore enables your very own, individual software, so you can focus on what’s best for your business, external workers and suppliers. Made up of packaged components that can individually be used and connected, as needed
APIs as First-Class Citizens
Outerscore has engineered numerous pre-build connectors and endpoints to ensure seamless integration with third party software. While building the platform we took an API-first approach. This allows a break down our software capabilities into individual, autonomous services which can be easily connected with third-party systems like ERP or HR software.
All our endpoints are accessible via Swagger UI. We integrate with your existing solutions much faster than you might expect.
ISMS – No Security Concerns
We build, manage and maintain our application based on an information security management system (ISMS) that has been independently audited and certified according to ISO27001.
The ISMS assures a set of security controls that protect the confidentiality, availability, and integrity of confidential, personal, and sensitive data from being leaked, damaged, destroyed, or exposed to harmful elements.
Secure Architecture: Our tiered architecture provides multiple layers of protection. Each application operates in its own silo, heavily protected from the internet by our front-end load balancers, layer-3 and web application firewalls and intrusion detection systems
Encrytion in Transit and at Rest: Any data that is transferred over the internet uses industry-standard encryption: All traffic in transit uses the latest secure cipher algorithms (TLS 1.2) and we use per customer (AES-256) keys to encryt data on disk
Audit Logging: Every change in the system and all data transfers via API to other systems are logged using latest Amazon Web Services technology like AWS CloudWatch and AWS CloudTrail. All log data is stored for at least 14 days
Attribute-based Access Control: Outerscore maintains a fine grained access control using a combination of authentication, authorization, and entitlement mechanisms. We support several authentication options such as Okta, OneLogin, or SecureAuth to provide seamless SSO
Performance and Availability: Our infrastructure-as-code (IaC) approach allows us to restore or launch our entire infrastructure in less than 30 min. Utilizing the leading enterprise business cloud – AWS – allows us to make use of best-in-class cloud hosting security standards
Security Assessments and Tests: We continuous test our application for security flaws and potential vulnerabilities. Every line of code must pass rigorous testing in three different environments before it is deployed to our customers