Alshafak Accounting system is a leading accounting software that was developed specifically for the Libyan market and that is based on our long experience with our customers and their needs. Over the years Alshafak Accounting system has been adopted by many business in Libya with capital that ranges from a few thousand to hundreds of millions of Libyan Dinars. With the implementation of our software solution business owners will be able to assess their companies financial status at any given moment, thus insuring better organization and business growth.
We are committed to become the customer's partner to success.
Alshafak Human resources &Payroll
HR / Payroll software. Is a fully integrated systems that is very dynamic and is easily customized and tailored to meet organization specific human resources requirements. This software caters for organizations of every size. It is powerful , very easy to navigate tried ,tested and affordable!
Embassys Accountant & Payroll solutions
This solid accounting solution was initially developed 13 years ago for the Libyan treasury as a solution that is based on the Libyan business model and business law .and has since also been implemented in over 30 Libyan embassies worldwide.
IBM InfoSphere Guardium
InfoSphere Guardium provides a simple, robust solution for preventing data leaks from databases and files, helping to ensure the integrity of information in the data center and automating compliance controls. It scales easily, using built-in automation and integration functions to reduce operational costs while adapting to changes in audit requirements and the environment. Irrespective of system size, InfoSphere Guardium simplifies operations and can help you:
Automatically locate databases and discover and classify sensitive information within them
Automatically assess database vulnerabilities and configuration flaws
Ensure that configurations are locked down after recommended changes are implemented
Enable high visibility at a granular level into database transactions that involve sensitive data
Track activities of end users who access data indirectly through enterprise applications
Monitor and enforce a wide range of policies, including sensitive data access, database change control, and privileged user actions
Create a single, secure centralized audit repository for large numbers of heterogeneous systems and databases
Automate the entire compliance auditing process, including creating and distributing reports as well as capturing comments and signatures