QuickBooks Business Champion – April 2015

This month’s QuickBooks Business Champion is ID-Tech, a young, energetic company with international representation that is owned and managed by Tony and Cheryl Howell. It develops innovative technical solutions specific to client needs. With a cutting-edge software and hardware development team, they have developed ID-Asset Track, a web-based solution that integrates the latest RFID technologies with access control, CCTV and asset registry systems to solve the problem of secure asset management in real time. While the ID-Asset Track solution may be tailored to meet specific business needs, it is designed to seamlessly integrate into existing platforms. A rather unique service offering in their industry.

Cheryl Howell heads up Business Development for ID-Tech and was first exposed to QuickBooks while working in the US. Cheryl introduced ID-Tech to QuickBooks in 2010 and they have been using QuickBooks Software ever since. Cheryl had this to say about QuickBooks, “QuickBooks provides integrated tools and functionality that support core business activities and management reporting requirements in real time, while the accounting happens in the background. The Premier system, affordable to any size of business, offers a full range functionality including: customer, sales force, item, project, inventory, fixed asset, time and expense, supplier, bank and multi-currency management. The QuickBooks Premier standard reporting capabilities far exceed those of any similar sized system”.

She concluded by stating, “QuickBooks has proven to be an invaluable asset to our business!”.

Contact Cheryl Howell of ID-Tech on Cheryl@id-controltech.com or visit their website for more details: www.id-controltech.com

Comments are closed.

Please fill out the form below to receive the trail demo link

Personal Information
Where a party receives any personal information (“PI”) related to the other party, the party who receives the PI, will comply with and have adequate measures in place to ensure that its employees, agents, subsidiaries and representatives comply with the provisions and obligations contained in the Protection of Personal Information Act, No. 4 of 2013. Any PI pertaining to one party which is required by the other party, will only be used by that other party for the purposes of this contract and will not be further processed or disclosed without the written consent of the latter and the recipient of that PI will take all reasonable precautions to preserve the integrity and prevent any corruption or loss, damage or destruction of the PI. If and when the contract is terminated, each party will, save to the extent that it is required to do otherwise by any applicable law, erase or cause to be erased, all PI and all copies of any part of the PI relating to the other party”.

Please fill out the form below to receive the trail demo link

Personal Information
Where a party receives any personal information (“PI”) related to the other party, the party who receives the PI, will comply with and have adequate measures in place to ensure that its employees, agents, subsidiaries and representatives comply with the provisions and obligations contained in the Protection of Personal Information Act, No. 4 of 2013. Any PI pertaining to one party which is required by the other party, will only be used by that other party for the purposes of this contract and will not be further processed or disclosed without the written consent of the latter and the recipient of that PI will take all reasonable precautions to preserve the integrity and prevent any corruption or loss, damage or destruction of the PI. If and when the contract is terminated, each party will, save to the extent that it is required to do otherwise by any applicable law, erase or cause to be erased, all PI and all copies of any part of the PI relating to the other party”.