• Phone +9712-6348495
  • Murtaza@EmiratesTenders.com

Our Services E-Procurement Modules

Centralized Registration System

Centralized Registration System

Supplier Registration, Centralized Tenderer, Payment service providers registration
Read More
e-Tendering System

e-Tendering System

Annual Procurement Planning (APP), Standard Tender Document (STD) Library
Read More
e-Contract Management System ( E-CMS)

e-Contract Management System ( E-CMS)

Work Plan Submission, Progress Report generation, submission / acceptance
Read More
e-Procurement Management Information

e-Procurement Management Information

Compliance monitoring through key procurement performance indicators
Read More
Workflow management System

Workflow management System

The workflow functionality the system support the contract management aspects of e- tendering and e-purchasing
Read More
e-Payment System

e-Payment System

Registration Fee, Tender document purchase fee, and other services fee Collection
Read More

eAuction

eAuction (Reverse – Forward) is a Dynamic Bidding tool that allows suppliers / buyers to compete online to Buy / Sell.

The objective is typically to arrive at the lowest total cost 12% is an average savings achieved using eAuction.

Reverse Auction, Forward Auction, RFX followed by eAuction
Standard Auction, Rank Auction, Transformational Auction, Preferential Auction
Masking / Unmasking Bidders, Configurable Extensions, Lot / Item wise bidding
Awesome Image

Supplier Management

Objective : To empanel & rate reliable and quality consious supplier for energy sector based on predefine criteria
  • Supplier Registration Application
  • Evaluate, Categorize, Enlist
  • Parameter based Supplier Rating
  • Mapping of Existing Supplier Network
  • Market Making / Vendor Outreach
  • Access to the 5 lakh+ Supplier Database of Government / Corporate Organizations
Awesome Image

Application Security

WE UNDERST A N D THE SESITIVITY OF PROCUREMENT PROCESS
  • 256 bit SSL Certificate, Firewall, IDS / IPS
  • Prevention of OWASP Top 10 threats
  • Client & Server side validations, Anti virus / Malware protection
  • Secure Coding Guidelines, Audit trail & Exception handling
  • Role & Rights based Access
  • Secure Password Policy, Use of Google CAPTCHA Code