Exela Technologies, Inc.

Exela Technologies, Inc.

Exela Technologies, Inc. ("Exela") is a location-agnostic global Business Process Automation ("BPA") leader combining industry-specific and multi-industry enterprise software and solutions with decades of experience. Exela is a leader in work flow automation, attended and un-attended cognitive automation, digital mail rooms, print communications, and payment processing with deployments across the globe.

APPLICATIONS ACHIEVING VERIFIED STATUS
PCT
O3
Application Name: BancHUB
APPLICATION DESCRIPTION:

BancHUB is a global payment gateway designed to simplify consolidation of multi-national payments. It normalizes, analyzes, and enables straight-through processing for accuracy and fast funds availability. Using BancHUB, clients with disparate payment methods are able to lower routing costs and achieve higher data security for cleaner posting.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Digital Mail Room
APPLICATION DESCRIPTION:

Exela’s Digital Mailroom solution provides web-based “out-of-the-box” functionality to give physical paper mail and documents the speed and flexibility of electronic transactions. The SaaS solution manages the entire process from digitization of incoming paper mail to the delivery of the mail to the right person at the right time.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Box Office
APPLICATION DESCRIPTION:

BoxOffice gives you the power to aggregate, enhance, summarize and route your documents for real-time business intelligence and secure document archival.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: PCH Global
APPLICATION DESCRIPTION:

PCH is Exela’s end-to-end insurance platform integrating disparate data systems to automate core processes and connect key stakeholders and workflows. PCH covers member enrollment, claims receipt, adjudication and processing, storage/archival, claims administration, claims policy management, communication services, payments and more. Intake methods include EDI, API, FTP, fax, email, web portal, desktop scanning, along with mobile device upload and a virtual printer feature (print to image). It will shorten claims processing times, reduce the cost of claims management, adapt to changing compliance requirements and be more responsive to policy holders.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: BEATS
APPLICATION DESCRIPTION:

BEATS™ is a collaborative and comprehensive business project management solution that connects all departments in an organization to manage opportunities , change requests and Projects through their entire life cycle.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela Banking Services
APPLICATION DESCRIPTION:

Exela Banking Services is a global payment and transaction management platform for cash management, payment processing, enterprise information sharing, and efficient and secure fund transfers with any payment media and between any country and any currency.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela Procure to Pay (Exela P2P)
APPLICATION DESCRIPTION:

Exela Procure to Pay provides a range of cloud-based Procurement to Payment services that allow organizations to connect, transact, collaborate, and manage their businesses in an easy and simple manner. Exela Procure to Pay offers complete Procure to Pay solutions – to manage Catalogs, Purchase Requests, Purchase Orders, Goods Receipts, Check Requests and Invoices. Accounts Payable Workflow with high degree of automation helps organizations reduce costs and errors and improve turnaround times.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: DrySign
APPLICATION DESCRIPTION:

DrySign is a digital signature platform enabling quick and secure contract signing. The application allows users to sign documents electronically and also e-mail the documents for electronic signatures to one or more recipients. Documents signed by DrySign are legally binding.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: eBPA
APPLICATION DESCRIPTION:

eBPA is Exela's RPA product that provides services for automating business processes graphically with Exela cognitive engines. Benefits include productivity improvements, efficiency gains and cost savings, quality, consistency and accuracy enhancements, customer experience, and employee empowerment. These benefits enable staff to think, create, and innovate.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela HCM
APPLICATION DESCRIPTION:

Exela’s HCM is online web application developed for HR functions. It is a one stop solution for all HR activities.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Genie
APPLICATION DESCRIPTION:

Genie is a desktop back ground application which was developed and owned by Exela. It’s used by management to monitor the machine usage, asset management, course / test mandates.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: PCT
APPLICATION DESCRIPTION:

PCT is a customer interaction portal for Corporate Tax processing. The portal allows users to search, retrieve, and view Corporate Tax Return documents, as well as working the Verification Queues. PCT is the platform that is replacing FASTRIEVE and, eventually, tRex.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: BancPay - Mobile
APPLICATION DESCRIPTION:

BancPay mobile application is created in order to manage the Invoices on the go. All the “Pending Approval” will display in the user’s hand-held device, which helps the user to take logical decisions.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: PrintShop
APPLICATION DESCRIPTION:

PrintShop is a fully configurable web-based, job submission and print management platform that enables organizations to manage the intake and completion of print and fulfilment requests. PrintShop connects directly with on-site reprographics centres, Exela’s 6 off-site Print Centres, or another third party print facility of your choice where orders are fulfilled.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Athena
APPLICATION DESCRIPTION:

Athena helps to organize a company’s data and derive actionable intelligence for enhanced profitability and connectivity. Athena aggregates structured and unstructured disparate data in a method that quickly processes and deploys large datasets. This allows the system to instantly pull and interpret key information, which can then be formatted in one cohesive place.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Spring Benefits
APPLICATION DESCRIPTION:

As a multilevel SaaS platform Spring^®^ offers efficient process management from enrollment to claims. Spring provides a variety of features including plan comparison and selection, enrollment, payments, report generation, claim tracking, benefit coordination, and many others. These features combine to make the insurance process seamless and free from the hassle of communication hurdles.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela-Smart Office
APPLICATION DESCRIPTION:

A complete suite of office automation solutions – optimizing facility efficiency, and enhancing experiences.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: TIMO
APPLICATION DESCRIPTION:

TIMO is an automated and customizable incident tracking system with a web interface. All communications and notification are tracked providing a complete audit trail of all service request activities. Comprehensive reporting provides an excellent means of monitoring and processing service calls effectively and efficiently. Ticket related APIs provides flexibility of integration with other Ticketing Systems

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Farmers
APPLICATION DESCRIPTION:

The app automates the current manual process performed by the Agents, where in the agents used to physically collect the checks from end customers and deposit in the bank

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: O3
APPLICATION DESCRIPTION:

O3 is a web based collection system to manage first party and third party accounts. The Dashboards enable managers and users to view work in progress accounts, pending accounts, collection figures, collection goals.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Document DNA (docDNA)
APPLICATION DESCRIPTION:

Document DNA is secure repository electronic solution and document management platform for the content storage and retrieval of large volumes of documents: scanned images or computer‐generated text.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Data Room
APPLICATION DESCRIPTION:

Data Room is a repository of business-critical documents, a platform for file storage, file sharing, document exchange and upload. It provide total control over access and delivery of business-critical documents to ensure every business unit is empowered with the data they need, when they need it. Also Securely stores your documents electronically with user-based access for seamless retrieval and presentment in most formats.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: OpenBox
APPLICATION DESCRIPTION:

OpenBox is a 3 tier end to end conversion workflow product designed to minimize the conversion costs of paper and film. The goal was not to develop a “clone” of what already existed on the market only with slicker user interfaces and catchy acronyms. Instead, a lot of time was spent evaluating the conversion process, identifying bottlenecks, and any shortcomings of the existing products on the market, as well as areas where available technology could replace labor units.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Talento
APPLICATION DESCRIPTION:

Applicant tracking solution offers an end to end recruitment tool that supports the HR recruitment function from creating a requisition to on-boarding an employee. The modules include create and manage a requisition, sourcing, screening, interviewing, onboarding and feedback management of candidates.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Firefly
APPLICATION DESCRIPTION:

Firefly is a highly secured enterprise data acquisition platform patented & developed by SourceHOV, caters high performance for data capture environment. Core concept is key what you see, thus reduces training effort and improves productivity.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: LAD (Lexicode Audit Database)
APPLICATION DESCRIPTION:

LAD Audit is a component to deliver Lexicode's quality metrics to client and employee.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Design Studio
APPLICATION DESCRIPTION:

Procure Design Studio enables the customers to explore the service capabilities of an organization and to subscribe to services seamlessly. Empowers Sales, CRM, Solution Engineers to formulate and transform customer expectations into Business process flow and solutions. Design Studio has been developed to provide business with technology solutions through a configurable software suite, designed for end-to-end management of any organisation’s content and business processes via intuitive customisation and rapid deployment by any user.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela Auth
APPLICATION DESCRIPTION:

Centralized service used by Exela Applications for Authentication and SSO.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela Bill Pay
APPLICATION DESCRIPTION:

Exela Bill Pay is B2C Solution, Mainly Focus on Electronic Bill Presentment and Payment functionality which is a process that enables bill to be created, delivered, and paid over the internet.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela Eon
APPLICATION DESCRIPTION:

Exela Business Process Automation (EON) is robotic process automation as a service, which creates a virtual workforce that operates alongside with humans to automate structured and repetitive computer-based tasks.

Exela EON Provides services for automating the business process graphically with Exela cognitive engines.  

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Contract Management
APPLICATION DESCRIPTION:

Exela's Contract management is an innovative product which makes contract management smarter and simpler. It enables users to have an end to end control over contracts throughout its life cycle resulting in improved governance, mitigate risks, increase user's productivity, remain compliant and maximize profits.

It is a web based application aimed at easy and centralized management of all contracts related to an organization. Users can keep a close track of all contracts, enabling them in an efficient administration.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: PERI
APPLICATION DESCRIPTION:

PERI is a web and app-based expense management platform that can be used to punch in all official expenses, including expenses incurred for official trips. PERI enables users to quickly review their organization's  expense policy and helps them stay within their allocated allowances thus helping businesses to optimize costs by bringing more visibility and control into corporate spending, automate the current manual process of submitting expenses, create a centralized repository/archive. Overall, make it Easy, Convenient & Secure for expense submission and reimbursement process.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

The Veracode Verified directory is an online platform that enables you to view a list of companies that are in the Verified program. The companies provide applications or solutions created by such third-party companies (“Third-Party Offerings”). The Third-Party Offering, and its associated content provided to you, is subject to a separate End User License Agreement (“EULA”) with the applicable licensor.

These are Offerings that are not owned, created, licensed, or sponsored by Veracode. Veracode does not assume any liability with any Third-Party Offering and is not responsible for the quality, accuracy or nature of the Third-Party Offering or its content. Nothing in any third-party EULA shall limit, impact or supersede any of these terms.

GET VERIFIED TODAY

Learn More