Integrated workflows

We integrate our solution into your IT environment.

Using multiple systems to perform a single inspection, is time-consuming and inefficient. Smartflow is your trusted partner when you want to keep all your data safe and protected.


All processes connected


The Open Data Protocol which is an open protocol that allows the creation and consumption of queryable and interoperable REST APIs in a simple and standard way.

File exchange

We support (S)FTP as PDFs, Pictures, XMLs, CSVs.

Native development

You can create plugins and webhooks.

Direct Database access

It is possible to install direct database access if the developer’s access is permitted.

Cloud configuration

It is possible to extend functionalities by additional cloud configuration and the integration with cloud services if the developer’s access is permitted.

Single Sign-On

We use plugins from Auth0 to use Single Sign-On and even SCIM.

All data secured


OWASP 2.0 compliant.

App - access

The app is enforcing strong passwords and access keys expire.

App - authentication

We use Auth0 for identity management.

2-factor authentication

Enterprise users get access to 2FA.

App - encryption

The app database is encrypted (AES-256) and sensitive data is encrypted in users' private keystore.


Plus Cloudflare. Azure. Web application firewall and whitelist or blacklist IP addresses.

Database server - Private. Encrypted. Data masked.

Isolated and private database. DB encryption enabling. Hide data for certain users or user groups.

Offline & Online

When back online, data is updated automatically through background sync and everyone is notified.

Agile operations for fast growing businesses

Has your business managed to adapt to the changes required as a consequence of the COVID-19 regulations? Reducing operational risks should be a top priority to organizations across all industries. Assuring that critical inspections are automatically shared with the company's right people, so the data is always transmitted to the people in charge would enhance the current collaboration method.

Is performing inspections using MS Excel, MS Word, or Google Sheets, part of the shadow IT landscape?

In this whitepaper, we are going to clear the air by explaining how inspection engineers use these technologies, how they might impact the businesses’ growth and security in the long run, what risks arise across the organisation, and what is the alternative.

When asked about the impact of shadow IT, any IT department will address the security threat that arises for the IT systems. External technology like personal local pc or laptop, or personal cloud environment, that hasn’t gone through rigorous testing is perceived as hard to control.

Keep Connected

Subscribe to our newsflash.

Follow us


  • Veemarktkade 8, Office 4113

  • 5222 AE 's-Hertogenbosch
  • The Netherlands
  • This email address is being protected from spambots. You need JavaScript enabled to view it.
Copyright © 2022 Smartflow Nederland BV