SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Technical Brief v1.0
Communication tools that broadcast visual content
           directly onto the screens of computers,
              using multiple channels and formats




                                                INFO FOR YOU….INFO FOR Y




  Easy to install. Easy and quick to use.
Measure delivery, click-throughs, responses.
Communication Tools
In a nutshell SnapComms…
  •   is an HTTP based Client / Server pull technology.
  •   has Clients for Windows, MAC, iOS and Android.
  •   uses HTTP/HTTPS on customizable ports.
  •   supports WAN links, VPNs & Proxies.
  •   has SnapComms Hosted & local installation options.
  •   is constantly tested and monitored for intrusion prevention
  •   provides a high degree of data security
  •   has one point of contact for support
  •   is using brand able templates for content display
The SnapComms Server…
 •   is necessary for local installation only
 •   is built with ASP.NET.
 •   provides access to clients via a web service framework.
 •   is supported on Win 2003 or higher.
 •   works with SQL Server 2005 or higher.
 •   requires IIS6 or higher.
 •   comes with detailed installation documentation for
     applications and database.
 •   includes extensive logging capabilities.
 •   integrates Windows or Forms Authentication.
 •   has detailed but easy to manage access control.
The SnapComms Windows client…

 •   is simple to deploy with MSI enabled
     deployment tools.
 •   is supported on Windows XP / IE6 and higher.
 •   encrypts it’s data storage.
 •   integrates into Thin-Client environments like
     Citrix.
 •   integrates with Active Directory.
 •   has a minimal user Interface to minimize
     support.
The Smartphone clients…

 •   will be available Q2 2012
 •   work on iOS 3 / Android 2.1/ Blackberry 6 or
     higher
 •   use a web service based API to access the
     server
 •   support optional / additional push notifications
 •   provide a simple, fully touch enabled UI
 •   are fully brandable
 •   can be easily pre-configured
 •   install directly from the application market
     places
The Network Connectivity…
 •   is from ground up designed to be minimal.
 •   ensures message content (including
     screensavers) is only downloaded once and
     cached (encrypted) on the client.
 •   uses standard HTTP protocols.
 •   works through all standard compliant proxies.
 •   is secured through data encryption via HTTPS.
 •   is routed through a single, configurable port to
     make it easy to pass firewalls.
 •   works perfectly with VPN and WAN link setups.
Active Directory Integration…
 •   makes user, machine and group integration easy.
 •   works fully transparent.
 •   takes place on client side using standardized
     ADSI API.
 •   doesn’t need to access to AD from the server
 •   supports multiple domains/forests and nested
     groups.
 •   collects only clearly specified attributes.
 •   synchronizes the data periodically (6 hours
     default).
 •   is cached encrypted on the client.
 •   encrypts it’s data exchange with the server.
SnapComms Security…
•   is a key policy.
•   has strong authentication and authorization
    processes.
•   includes secure data storage and data transfer.
•   is ensured by constant on going testing.
•   is tested with industry standard tools.
•   includes extensive intrusion testing.
•   minimizes the points of attack.
•   has well defined processes for quick escalation
    and counter measures.
SnapComms Support & Monitoring…

 •   operates 24 x 7.
 •   provides one single point of contact for all enquiries.
 •   has call escalation policies.
 •   bases on clear and easy to understand SLA
     agreements.
 •   works with industry standard support management
     tools.
 •   has well defined issue escalation procedures and
     paths.
 •   guarantees service availability for the hosted solution.
 •   provides a guaranteed response time.
 •   makes your life easier.
References…
 •   Overview of the SnapComms Architecture
 •   SnapComms Client Deployment Overview
 •   Thin Client Implementation
 •   Integration with Active Directory
 •   Assessment & Implementation of the Hosted Solution
 •   Security Overview
 •   Template Guidelines
 •   Assessment & Implementation of a local installation
 •   System Requirements for the locally installed solution
 •   Implementation Tips

Weitere ähnliche Inhalte

Ähnlich wie SnapComms Technical overview

Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
APPSeCONNECT
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AG
Software AG South Africa
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
 

Ähnlich wie SnapComms Technical overview (20)

AdroitLogic Product Portfolio
AdroitLogic Product PortfolioAdroitLogic Product Portfolio
AdroitLogic Product Portfolio
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Vp ns
Vp nsVp ns
Vp ns
 
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
Chapter08
Chapter08Chapter08
Chapter08
 
An introduction and overview to Software as a Service
An introduction and overview to Software as a Service An introduction and overview to Software as a Service
An introduction and overview to Software as a Service
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft Azure
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AG
 
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 

Mehr von SnapComms

A Cat's Guide to Internal Comms
A Cat's Guide to Internal CommsA Cat's Guide to Internal Comms
A Cat's Guide to Internal Comms
SnapComms
 
SnapComms Quick Intro
SnapComms Quick IntroSnapComms Quick Intro
SnapComms Quick Intro
SnapComms
 

Mehr von SnapComms (20)

5 Point Internal Communications Plan
5 Point Internal Communications Plan5 Point Internal Communications Plan
5 Point Internal Communications Plan
 
Internal Marketing - Tips to align staff to your brand values and vision
Internal Marketing - Tips to align staff to your brand values and visionInternal Marketing - Tips to align staff to your brand values and vision
Internal Marketing - Tips to align staff to your brand values and vision
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security Awareness
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Hospital Internal Communication with SnapComms
Hospital Internal Communication with SnapCommsHospital Internal Communication with SnapComms
Hospital Internal Communication with SnapComms
 
Internal sales manager communication with SnapComms
Internal sales manager communication with SnapCommsInternal sales manager communication with SnapComms
Internal sales manager communication with SnapComms
 
Internal product manager communication with SnapComms
Internal product manager communication with SnapCommsInternal product manager communication with SnapComms
Internal product manager communication with SnapComms
 
Internal communications with SnapComms
Internal communications with SnapCommsInternal communications with SnapComms
Internal communications with SnapComms
 
Internal communication for hospitals with SnapComms
Internal communication for hospitals with SnapCommsInternal communication for hospitals with SnapComms
Internal communication for hospitals with SnapComms
 
Internal helpdesk communication with SnapComms
Internal helpdesk communication with SnapCommsInternal helpdesk communication with SnapComms
Internal helpdesk communication with SnapComms
 
Internal health and safety communication with SnapComms
Internal health and safety communication with SnapCommsInternal health and safety communication with SnapComms
Internal health and safety communication with SnapComms
 
Get Employee Attention
Get Employee AttentionGet Employee Attention
Get Employee Attention
 
A Cat's Guide to Internal Comms
A Cat's Guide to Internal CommsA Cat's Guide to Internal Comms
A Cat's Guide to Internal Comms
 
SnapComms Quick Intro
SnapComms Quick IntroSnapComms Quick Intro
SnapComms Quick Intro
 
Contact Centre Communications Ideas
Contact Centre Communications IdeasContact Centre Communications Ideas
Contact Centre Communications Ideas
 
Your Security Awareness Program
Your Security Awareness ProgramYour Security Awareness Program
Your Security Awareness Program
 
Mobile in Enterprise Communication
Mobile in Enterprise CommunicationMobile in Enterprise Communication
Mobile in Enterprise Communication
 
Ideas to Motivate Sales Teams
Ideas to Motivate Sales TeamsIdeas to Motivate Sales Teams
Ideas to Motivate Sales Teams
 
Hand Hygiene Program Ideas
Hand Hygiene Program IdeasHand Hygiene Program Ideas
Hand Hygiene Program Ideas
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communication
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

SnapComms Technical overview

  • 2. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats INFO FOR YOU….INFO FOR Y Easy to install. Easy and quick to use. Measure delivery, click-throughs, responses.
  • 4. In a nutshell SnapComms… • is an HTTP based Client / Server pull technology. • has Clients for Windows, MAC, iOS and Android. • uses HTTP/HTTPS on customizable ports. • supports WAN links, VPNs & Proxies. • has SnapComms Hosted & local installation options. • is constantly tested and monitored for intrusion prevention • provides a high degree of data security • has one point of contact for support • is using brand able templates for content display
  • 5. The SnapComms Server… • is necessary for local installation only • is built with ASP.NET. • provides access to clients via a web service framework. • is supported on Win 2003 or higher. • works with SQL Server 2005 or higher. • requires IIS6 or higher. • comes with detailed installation documentation for applications and database. • includes extensive logging capabilities. • integrates Windows or Forms Authentication. • has detailed but easy to manage access control.
  • 6. The SnapComms Windows client… • is simple to deploy with MSI enabled deployment tools. • is supported on Windows XP / IE6 and higher. • encrypts it’s data storage. • integrates into Thin-Client environments like Citrix. • integrates with Active Directory. • has a minimal user Interface to minimize support.
  • 7. The Smartphone clients… • will be available Q2 2012 • work on iOS 3 / Android 2.1/ Blackberry 6 or higher • use a web service based API to access the server • support optional / additional push notifications • provide a simple, fully touch enabled UI • are fully brandable • can be easily pre-configured • install directly from the application market places
  • 8. The Network Connectivity… • is from ground up designed to be minimal. • ensures message content (including screensavers) is only downloaded once and cached (encrypted) on the client. • uses standard HTTP protocols. • works through all standard compliant proxies. • is secured through data encryption via HTTPS. • is routed through a single, configurable port to make it easy to pass firewalls. • works perfectly with VPN and WAN link setups.
  • 9. Active Directory Integration… • makes user, machine and group integration easy. • works fully transparent. • takes place on client side using standardized ADSI API. • doesn’t need to access to AD from the server • supports multiple domains/forests and nested groups. • collects only clearly specified attributes. • synchronizes the data periodically (6 hours default). • is cached encrypted on the client. • encrypts it’s data exchange with the server.
  • 10. SnapComms Security… • is a key policy. • has strong authentication and authorization processes. • includes secure data storage and data transfer. • is ensured by constant on going testing. • is tested with industry standard tools. • includes extensive intrusion testing. • minimizes the points of attack. • has well defined processes for quick escalation and counter measures.
  • 11. SnapComms Support & Monitoring… • operates 24 x 7. • provides one single point of contact for all enquiries. • has call escalation policies. • bases on clear and easy to understand SLA agreements. • works with industry standard support management tools. • has well defined issue escalation procedures and paths. • guarantees service availability for the hosted solution. • provides a guaranteed response time. • makes your life easier.
  • 12. References… • Overview of the SnapComms Architecture • SnapComms Client Deployment Overview • Thin Client Implementation • Integration with Active Directory • Assessment & Implementation of the Hosted Solution • Security Overview • Template Guidelines • Assessment & Implementation of a local installation • System Requirements for the locally installed solution • Implementation Tips