3D Secure Checkout
Fraud protection that requires customers to complete an additional verification step with the card issuer when paying.
Accurate stock count
Stock count stays accurate by automatically reserving and tracking purchased items (post or pre payment). Ensuring the right amount of products are available for purchase.
Allow negative stock
Sometimes it's a good idea to allow negative stock to prevent overstocking and quickly respond to changes in demand.
API Keys
Generate different API keys for your different integrations, with specific permissions to increase security.
Automatic management of customer supported warehouses at checkout
Automatically manage store inventory status at checkout based on where a customer comes from (if allowed to shop there).
Choose how variants are shown (dropdown, checkbox etc)
Physical ProductsSite BuilderProduct variant
Choose your prefered presentation of variants such as a dropdown menu, checkboxes, radio buttons etc
Create bulk product (allow/refuse multiples)
Physical ProductsDigital Products
Quickly create multiple products at once with options to allow or prevent duplicate entries, saving time when managing large inventories.
Custom attributes for products
DevelopersDigital ProductsPhysical Products
Add additional information for products, beyond the standard product attributes.
Custom DPA signing
Create and sign custom data protection agreements (DPAs) with partners and customers. Enabling additional control and security for sensitive data.
Custom Pricing Per Variant
Physical ProductsProduct variant
Set the exact price per variation, rather than having to set a general price for all, allowing customers to tailor their purchase to fit their unique requirements and budget.
Custom SMTP
Use your own email server to send emails through the platform. This is useful if you have specific security or compliance requirements.
Daily backup with hourly snapshots
Our backups are always up-to-date and protects against potential data losses due to malfunction, user errors or malicious attacks.
Detailed audit log
A comprehensive record of events, activities, and changes in the system is invaluable when trying to determine the cause of an incident or problem.
Developer log browser
View and search through the API logs for easy troubleshooting of issues and debug of applications.
Event log monitoring
White-labelManagementDevelopers+2
Stay on top of every event and decide when to get notified. The easy-to-read format makes troubleshooting faster. Developers gets extra information in a JSON format for easy integration.
Fully GDPR Compliant
Ensure full compliance with GDPR regulations to protect customer data and privacy across all operations.
High-Availability with auto failover
Ensures that a system or application remains available and fully operational by automatically switching to a backup if the primary system fails, providing a high level of availability and minimal downtime.
High-quality API documentation
Our clear and detailed instructions makes it easy to integrate your other systems with our platform.
Hosted on a distributed and sandboxed cloud
Enjoy maximum performance while your data and resources are protected and isolated in a virtual environment to minimize the risk of downtime or data breaches.
Increase/decrease price if stock falls below a threshold
Physical ProductsAutomations
Improve your pricing strategy and profits by automatically adjusting the price of a product based on the current level of inventory.
Inventory Notifications
ReportsAutomationsPhysical Products
Get a notification when a products stock is running low to avoid lost sales and unhappy customers. These notifications can be sent via email, SMS, or push notification.
Multi-factor authentication
Choose between Two-Factor or Multi-Factor login depending on your preference. The login methods are password, fingerprint, yubikey, authenticator app, facebook or code via email/sms. You can also login from another device.
No cookie notification approval needed
There is no need to display an annoying pop-up box for cookies consent to the users as all the necessary software and tracking are already built into Tamio
Permissions for API Keys
Set specific permissions for each API key to control which actions can be performed. This helps to ensure that only authorized users can access certain features or data.