Frequently Asked Questions (FAQ)

24 August 2017 - antara information technology

Password forgotten.

I have forgotten my password. What I can do?

There is a link next to the "login" fields to remember the password.
This link starts a process to verify that you are a registered user before reseting the password.

24 August 2017 - antara information technology

Activating a Support User

I am an account manager, and I have seen that there is the possibility of activating an "antara user". What is the purpose of this possibility?

You can grant access to a user from antra (email domain at any time you need support to resolve a question about the configuration of your account. Creating users with antara domain email do not consume users of your contract.

Once activated, the antara support person will be able to access your account information and give you assistance in what you need. You can register a specific antara support person (with personal name and email address), or a generic user provided by the antara Support Service.

You can turn this user on and off at any time, as well as assign to her different types of permissions. Please note that this user is subject to the same access rights restrictions as the other users of your account. Therefore, if you do not give the Editor rights to activate the ability to edit the semantics - for example - the support user can not help you resolve any issues with that topic.

You can activate more than one user.



24 August 2017 - antara information technology

Forwarding information outside the company.

I have forwarded an email with alerts to another person, but the software asks for a password to read the information.

Both the Semantic Competitive Intelligence platform and the Business Ideas Management platform protect the information that is managed within the company.
Market signals under surveillance may carry associated strategic analysis that should not be accessible by unauthorized persons. So also the ideas of innovation or business initiatives are very valuable assets that must be protected.
If the platform would allow to unprotect that information by means of the forwarding - intentional or mistaken - of the emails, the information that we want to protect would be easily disclosed.
Therefore, any user must authenticate to the platform in order to access the information, and once inside she can access it according to their access rights.
If you want to resend a signal to an unauthorized person, you can copy the link that is associated with the signal title that has been delivered to you by the platform.
That link leads directly to public information, but it does not include analysis information nor metadata.


24 August 2017 - antara information technology

Should each user correspond to a different person?

We have users who are not connected simultaneously. Should each user correspond to a different person?

The number of users in the contracts do not correspond to "maximum number of connected users", but it is foreseen that each person is identified and operates from his own user account, based on his email.

Technically speaking, a group of people can share one single email account and simultaneously access the software, but this will lead to several important operational problems: All users receiving the same alert information, managers not having a clue who is contributing, and many other drawbacks.



24 August 2017 - antara information technology

How do I update the software?

How do I update the software? Should I download the updates? How much does the update contract cost?

Antara software is exploited in SaaS mode (Software as a Service) , which means that it is accessed through the Internet with a browser (we recommend Mozilla Firefox).

Updates are automatic, so you do not need to take any action as a user. Updates are included in the cost of the contract.

As a user, you will be informed by email of the new features included in the updates, but in any case we recommend following our profiles in social networks (see main page of our web site).


24 August 2017 - antara information technology

I received a "blocked IP" message.

I received an "IP Blocked" message and can not enter the private area of the website or application. What should I do?

IP blocking is an automatic system reaction for when someone wants to enter by fraudulently testing passwords.

The system interprets an intrusion attempt and blocks access from the IP addresses of the network where the access was attempted.

If you have made a mistake several times when entering the key, you must contact This email address is being protected from spambots. You need JavaScript enabled to view it. or through the option Resources => Support in the top menu of the website. Request the unlock, including your user email.

If it wasn't you, someone has tried to login by knowing your email, but not knowing your password. You must contact Support in any case.



23 August 2017 - antara information technology

Collaborate as a consultant for several companies.

I am a consultant who collaborates with several companies in their business strategy. Would it be possible to access more than one platform account, each for a different company?

Indeed, if you have authorization from the respective Administrators of each company (This is, if you are a registered user), you can easily access each of them without having to leave the application and re-login.
You should be aware that you will not be able to transfer information from one company account to another without authorization from the Administrator.
Keep in mind that for each account you may have different rights assigned, so you can perform tasks with the information of a company that you can not in another. It depends on the type of user assigned to you in each account.
We recommend that you use the same username (email) in all accounts, which will allow you greater comfort at the time of exploitation.

Efectivamente, si tienes autorización de los respectivos Administradores de cada empresa, podrás acceder a cada una de ellas fácilmente, sin necesitar salir de la aplicación y volver a hacer login.

Debes tener en cuenta que no te será posible transferir información de una cuenta de empresa a otra sin autorización del Administrador.

Ten en cuenta que para cada cuenta es posible que tengas asignados diferentes derechos, por lo que podrás realizar tareas con la información de una empresa que no te serán posibles en otra. Depende del tipo de usuario que se te asigne en cada cuenta.

Te recomendamos que al pedir el acceso emplees el mismo nombre de usuario (email) en todas las cuentas, lo que te permitirá una mayor comodidad a la hora de la explotación.

23 August 2017 - antara information technology

How is the information protected?

If access to the application is done on the Internet, how can I ensure the confidentiality of the information?

The information is protected to the highest standards. These are some of the data security features:

  1. The companies that use antara not only can not see the information belonging to another company, but they do not even know the fact that there are other accounts than theirs.
  2. Within a company account, the different types of users offered have different access rights.
  3. The access keys to the users are generated autonomously by the system, and are sent to each user in a particular and automatic way. Not even the Administrator in the company knows the keys of their users.
  4. Furthermore, antara staff can not access the user account accounts information with their keys, unless those companies give access permission by activating the support user.
  5. Subscription emails received by users, whether market signals or changes in business ideas, include only indexes to such signals or news. If the email was forwarded out of the company by an employee, the recipient would not be able to consult the information to which it is addressed.
  6. In the event that the company requires external assistance from a consultant, the company can assign a user account to that consultant, and cancel it when it is not necessary to attend.
  7. The antara service is operated by one of the first multinational on-line services, and is protected both physically and logically from malicious access. Specialized staff ensures safety.
  8. Access to information over the Internet is protected by SSL secure protocol, the same as that used to access electronic banking services.


En realidad, la información está mucho más protegida que en una organización normal. Te explicamos algunas de las características de seguridad:

1.       Las empresas usuarias de antara no sólo no pueden ver la información perteneciente a otra empresa, sino que ni siquiera conocen el hecho de que existen otras cuentas distintas a la suya.

2.       Dentro de una cuenta de empresa, los diferentes tipos de usuario ofrecidos tienen derechos de acceso distintos.

3.       Las claves de acceso a los usuarios se generan autónomamente por el sistema, y son remitidas a cada usuario de forma particular y automática. Ni siquiera el Administrador en la empresa conoce las claves de sus usuarios.

4.       Más aún, el personal de antara no puede acceder con sus claves a la información de las cuentas de las empresas usuarias, a no ser que dichas empresas den permiso de acceso activando el usuario de soporte.

5.       Los emails de suscripción que reciben los usuarios, ya sea a señales del mercado  o a evolución de las ideas de negocio, incluyen sólo los índices a dichas señales o noticias. Si el email fuese reenviado fuera de la empresa por un empleado, la persona receptora no podría consultar la información a la que se apunta.

6.       En el caso de que la empresa requiera de la asistencia externa por parte de un consultor, la empresa le puede asignar una cuenta de usuario a ese consultor, y cancelarla cuando no sea necesaria su asistencia.

7.       El servicio de antara es operado por  una de las primeras multinacionales de servicios on-line, y está protegido tanto física como lógicamente de accesos malintencionados. Personal especializado vela por dicha seguridad.

8.       Los accesos a la información por Internet están protegidos por protocolo seguro SSL, el mismo que se utiliza para acceder a los servicios de banca electrónica.

23 August 2017 - antara information technology

What computer configuration do I need?

What kind of settings do I need to install antara software?

You do not need to install software on your personal computer or servers in your organization. The software applications are accessible through the Internet.

This has many advantages for the user. Among them, we can highlight not having to invest or maintain computer infrastructure, immediate software update, data security, access from any place or device, etc.

21 August 2017 - antara information technology

Change of contact person or contract manager

We have changed the contact person and the user making the orders. What should we do?

Any user with Administrator-level permissions can manage the contract.

Do not forget to change permissions to the Administrator user who is no longer in charge, or disable that user if she has left the company. This can be done in the Administration > Users section of the application.

If the person to change was the only Administrator and this user can no longer enter, you must contact Support to assign an Administrator permission to another user of the contract.