Worldwide EDI
Interchange EDI documents with all your trading partners


Electronic Data Interchange

EDI Protocols

As an e-mail user, you are bound to receive several messages in the form of spam or advertising among your e-mails. Can you imagine if these messages were to reach your management system directly for integration into your ERP?

The criticality of the documents exchanged by EDI and the particular features of a model designed so that the internal IT systems of both sender and receiver can be automatically integrated without any human intervention make it necessary to develop secure communications platforms specially devised for these purposes.

The main communication protocols and services in an EDI system are as follows:

VAN (Value Added Network)

Not only communication protocols. We are talking about private networks specifically designed to exchange these messages. There are several different private networks worldwide around which the different EDI messages between businesses are exchanged. The interconnection between these networks is the basis that allows the exchange of EDI transactions between users who may be in different VANs.

AS1 and AS2

They are versions 1 and 2 of what is known as the Applicability Statement. A point-to-point communication system that uses internet as its communication channel, but providing special additional security layers that ensure secure exchange of communications between servers with these features.


Odette File Transfer Protocol was developed in the 80s by the “Organization for Data Exchange by Tele Transmission in Europe” (ODETTE) to exchange data through dedicated servers allowing the transfer of large volumes of information under maximum security guarantees.

This protocol is widespread in the European automotive sector, although its features and use of internet as communication channel open up the possibility of being used worldwide and in other sectors.


Secure File Transfer Protocol implements file access, transfer and management services. Initially designed as an extension to SSH 2.0 (Secure Shell Protocol) to provide it with file transfer capacity, it can also be implemented over other protocols. This protocol assumes that you are working on a secure communications channel such as SSH, that the server has been authenticated in the client application, and the user identity is available.

Key Benefits

  • No paper involved
  • Enhanced information processing
  • Cutting down processing and storage costs
  • Fewer errors
  • Automation of operations
  • Quicker response times
  • Integration of procedures between all trading partners



EDICOM will participate at FORUM 2019 organized by GS1 Belgium & Luxembourg

This event, that will take place in Brussels on March 12, will focus on the challenges of standardization posed by electronic invoicing and data synchronization