Goldfish Platform

Collect, validate, and monitor supply chain data

 

 

 

Smart Forms

Untitled (Website)-1

Intelligent Forms Customized to Your Needs

Goldfish’s dynamic form system is built to adapt to the specific needs of your organization, supporting a wide range of documentation, from labor eligibility reporting to trade documentation. 

Features

For expert in-line guidance

  • Collapsible sidebar
  • In-line explainer text
  • Tutorial videos and reference images
  • Dynamic fields based on previous answers

For better workflows

  • Auto-updates when regulations change
  • Populate vessel details from the Goldfish database
  • Revise forms after submission
  • Real-time dashboard of forms submission status

Dashboards

Custom dashboards provide each organization with a tailored view of relevant metrics, KPIs and real-time data. From high-level summaries to detailed metrics, Goldfish ensures you always have the insights you need.

Untitled (Website)-2

Security and Performance

DATA SECURITY

Advanced data protection

Security is non-negotiable—Goldfish delivers industry-leading data protection, optimized for performance and flexibility with:

  • Organization-based data isolation

  • Military-grade encryption for data at rest and in transit

  • Intelligent session management

  • Self Service Password Administration


PERFORMANCE

Fast and accessible

Performance enhancing features like server-side rendering, real-time updates without the need to refresh, plus usability features like switching between groups without logging out.

DATA STRUCTURE

Interoperable industry-wide

Data is stored using PostgreSQL and structured to the GS1 standard.  When applicable, the GDST data standard is used. Customer data can be exported and imported in a variety of formats, including APIs.


ACCESS CONTROL

Secure access with Keycloak

Goldfish uses Keycloak, an open-source identity and access management solution trusted by Fortune 100 companies, government agencies and leading tech companies to protect their most valuable assets.

  • Role-based Access Controls (RBAC)

  • Single Sign On (SSO) 

  • Multi-Factor Authentication (MFA)

  • Integration with Enterprise Identity Providers

  • Self Service Password Administration