upgrade to free!
image image image image image
Register Free

Travel Pro Mail

Get a professional email address / email account accessible from the web and OpenTravel CRM.

FREE QuickBooks

Simple Start 2008

Download the industry leading accounting software for free.

NOTE: Simple Start is for first–time QuickBooks users. It cannot import data from prior versions of QuickBooks, Quicken, or Peachtree. For Windows only.

Electronic Cruise Booking

Get real time access to Galileo's cruise inventory with low booking fee's of 99 cents per reservation .

Personal Email Domain

Send and receive email with a personal email address – You@YourDomainName.com .

Professional e-Marketing

Distribute and manage your email marketing campaigns — manage opt out requests, undeliverable email
addresses and view click through reports.

OpenTravel Professional

Go Ad-Free

OTC Professional Edition is a non-ad version of the industry-leading CRM solution. When upgrading from Express to Professional Edition, the application functionality remains the same, however, the advertisements are no longer displayed

Galileo Terminal

$9.99 per month

Capture and send PNR information between OpenTravel CRM and Galileo .


Flight Information & Tracking Service

View your clients flight status' in real time with a single click of the mouse .

Electronic Hotel Booking

Get real-time access to Galileo and Pegasus' hotel inventory to compare prices and book at the lowest rates .

Accounting Export

Accounting Export allows OpenTravel CRM users to export General Ledger journal entries into a comma separated values file. This file can then be imported into many accounting systems and all of the travel related accounting information will be available in the target accounting system. This feature allows users to choose their accounting platform independent of the CRM and travel management system.

Contract Management

Build net rate supplier contracts, manage contract inventory and book at contracted rates .

Data and Information Security
Frequently Asked Questions

We know that the security and protection of your business and customers' information is vitally important to you.

Information security is an essential aspect of any high quality, modern software solution, and we have implemented best practices security procedures to help ensure that your data is kept safe from loss and/or unauthorized use.

Security considerations occur at many levels, and we have addressed them.

Over the Wire Security

We employ 128 Bit encryption over Secure Socket Layer (SSL) when any sensitive data is transferred or transmitted. This method ensures that third parties cannot intercept or eavesdrop on transmissions and decode them.

Database Security

Security is applied to the database (the place where your information is physically stored). Database security includes data encryption within the database for sensitive data so that should any one obtain unauthorized access, the encrypted information could not be read. Additional security layers are also present that are designed to ensure that your data is logically partitioned from other users’ data and that only authorized users with valid credentials can access your data through the application. Finally, physical access to the database server is limited to only authorized parties and it is maintained in a secure, locked and pass code protected network environment.

In order to protect against data loss due to an unforeseen casualty, all information is backed-up and copied nightly and then stored in a separate back-up database at a separate physical location.

Network Security

Advanced firewall protection is provided to block unauthorized access into the network which hosts the OpenTravel CRM database and application server. This prevents third parties from gaining unauthorized access from a remote location via the internet or other communications mechanism.

Application Level Security

The OpenTravel CRM application also has built in security layers. This includes password protected access, and user level security with access permissions which can be set by the account owner. These user permissions include read, write and view level permissions.

In the case of very sensitive information like credit cards, only partial numbers are viewable on the screen, and another layer of password authenticated access is required to view the full account information. We further secure the information by stopping any mass copying or downloading by a user. In OpenTravel CRM, users who do have permission to view full credit card information can only view one record at a time, and there is no method for user initiated export.

Trusted Internal Party Security

A final step which is often not considered, but is also important is trusted internal party security. This relates to administrative access to systems from inside people. Many of the reported credit card “security breaches” have occurred from the inside by persons who have been given access to systems. While outsourcing is popular, we believe it represents a substantial security risk which cannot be controlled. At OpenTravel CRM only authorized employees of our company have access to the database system, and access is logged and monitored. Our employees are all located in our facilities within the United States.

Privacy Protection

In addition to the computer level security, OpenTravel CRM does not sell or share any of your customer information with any other third parties. You retain all rights to your business information.

Security Realities – Good User Practices

While we have implemented a variety of security measures to protect your data, the reality is no system, whether it is internet based or locally stored on your computer, is fool proof. And, it would be impossible to guarantee that your information is perfectly secure from theft. There are many things that users should do to maximize their protection. These include the following:

  • Change Passwords – Changing password frequently, while it is a real pain in the neck, is a powerful way to protect yourself. The most common way for thieves to steal data is by stealing or hacking passwords. They will try multiple combinations of obvious passwords and user names to gain unauthorized access. Changing your password frustrates that process.
  • Use Hard Passwords – Using a strong password is another way to stop access by providing an unlikely combination of characters that can be guessed. As you can imagine, one of the most common and notorious security lapses is when you use the word “password” as your password. This is the very first thing a hacker tries, preying on a user’s carelessness. Other weak passwords to avoid are: your first name, last name, birth date, spouse’s name, telephone number, pet’s name, or street address. What do these things have in common? Anybody can find that information on the internet and then use the information to guess what your password is.
  • Keep Your System Up to Date – Make sure you keep your operating system up to date. If you are a Windows users, Microsoft is continually providing a variety of security patched and updates that should be downloaded and installed. You can set your computer to automatically receive them and they will down load in the background. These updates close up “holes” that unsavory people have tried to exploit to gain access to your computer.
  • Spyware Blocker - Using a spyware blocking program is important because it will block any attempts to download programs to your computer in the background without you knowing it. These programs are often installed surreptitiously when you visit untrustworthy sites. Of course, it is hard to know what an untrustworthy site is sometimes, and that is why spyware blockers are important to use. Spyware is dangerous because these sneaky programs are loaded and they often provides the crooks with a way to watch or log what key strokes you make (which then gives them password information), or provide a way for them to remotely access your computer and search through your files, etc..
  • Antivirus Protection – You must have an anti-virus software program running. This can be Norton or Symantec or another popular antivirus program. If you don’t want to pay the price for expensive commercial antivirus software, you might want to check out ClamWin Antivirus, which is free software provided by a community of great people. It is kept up to date and automatically downloads new virus signatures, etc. It’s the best kept secret around! (http://www.clamwin.com/content/view/18/46/)
  • Keep Your Firewall On – If you are an individual with a computer hooked up to the internet, you should have a firewall. Firewalls block external people from accessing your system remotely. In the old days, creating and maintaining a firewall was some pretty heading stuff and required a battery of geeks to maintain it. Today, Windows has a built in firewall. You just have to make sure you have it turned on. It’s easy to check for Windows users. Just click “Control Panel” in your menu. Then look for the “Windows Firewall” icon and click on it. It will tell you if it is on or off. If it is off turn it on. It’s that simple.
Back Button Spacer Back Button

Data and Information Security

Information security is an essential aspect of any high quality, modern software solution.

OTC Free Edition FAQs.