SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Technical Brief v1.0
Communication tools that broadcast visual content
           directly onto the screens of computers,
              using multiple channels and formats




                                                INFO FOR YOU….INFO FOR Y




  Easy to install. Easy and quick to use.
Measure delivery, click-throughs, responses.
Communication Tools
In a nutshell SnapComms…
  •   is an HTTP based Client / Server pull technology.
  •   has Clients for Windows, MAC, iOS and Android.
  •   uses HTTP/HTTPS on customizable ports.
  •   supports WAN links, VPNs & Proxies.
  •   has SnapComms Hosted & local installation options.
  •   is constantly tested and monitored for intrusion prevention
  •   provides a high degree of data security
  •   has one point of contact for support
  •   is using brand able templates for content display
The SnapComms Server…
 •   is necessary for local installation only
 •   is built with ASP.NET.
 •   provides access to clients via a web service framework.
 •   is supported on Win 2003 or higher.
 •   works with SQL Server 2005 or higher.
 •   requires IIS6 or higher.
 •   comes with detailed installation documentation for
     applications and database.
 •   includes extensive logging capabilities.
 •   integrates Windows or Forms Authentication.
 •   has detailed but easy to manage access control.
The SnapComms Windows client…

 •   is simple to deploy with MSI enabled
     deployment tools.
 •   is supported on Windows XP / IE6 and higher.
 •   encrypts it’s data storage.
 •   integrates into Thin-Client environments like
     Citrix.
 •   integrates with Active Directory.
 •   has a minimal user Interface to minimize
     support.
The Smartphone clients…

 •   will be available Q2 2012
 •   work on iOS 3 / Android 2.1/ Blackberry 6 or
     higher
 •   use a web service based API to access the
     server
 •   support optional / additional push notifications
 •   provide a simple, fully touch enabled UI
 •   are fully brandable
 •   can be easily pre-configured
 •   install directly from the application market
     places
The Network Connectivity…
 •   is from ground up designed to be minimal.
 •   ensures message content (including
     screensavers) is only downloaded once and
     cached (encrypted) on the client.
 •   uses standard HTTP protocols.
 •   works through all standard compliant proxies.
 •   is secured through data encryption via HTTPS.
 •   is routed through a single, configurable port to
     make it easy to pass firewalls.
 •   works perfectly with VPN and WAN link setups.
Active Directory Integration…
 •   makes user, machine and group integration easy.
 •   works fully transparent.
 •   takes place on client side using standardized
     ADSI API.
 •   doesn’t need to access to AD from the server
 •   supports multiple domains/forests and nested
     groups.
 •   collects only clearly specified attributes.
 •   synchronizes the data periodically (6 hours
     default).
 •   is cached encrypted on the client.
 •   encrypts it’s data exchange with the server.
SnapComms Security…
•   is a key policy.
•   has strong authentication and authorization
    processes.
•   includes secure data storage and data transfer.
•   is ensured by constant on going testing.
•   is tested with industry standard tools.
•   includes extensive intrusion testing.
•   minimizes the points of attack.
•   has well defined processes for quick escalation
    and counter measures.
SnapComms Support & Monitoring…

 •   operates 24 x 7.
 •   provides one single point of contact for all enquiries.
 •   has call escalation policies.
 •   bases on clear and easy to understand SLA
     agreements.
 •   works with industry standard support management
     tools.
 •   has well defined issue escalation procedures and
     paths.
 •   guarantees service availability for the hosted solution.
 •   provides a guaranteed response time.
 •   makes your life easier.
References…
 •   Overview of the SnapComms Architecture
 •   SnapComms Client Deployment Overview
 •   Thin Client Implementation
 •   Integration with Active Directory
 •   Assessment & Implementation of the Hosted Solution
 •   Security Overview
 •   Template Guidelines
 •   Assessment & Implementation of a local installation
 •   System Requirements for the locally installed solution
 •   Implementation Tips

Weitere ähnliche Inhalte

Was ist angesagt?

APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...apidays
 
Going outside the application
Going outside the applicationGoing outside the application
Going outside the applicationMatthew Saltzman
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemRuncy Oommen
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAmazon Web Services
 
PCI 3.0 and penetration testing
PCI 3.0 and penetration testingPCI 3.0 and penetration testing
PCI 3.0 and penetration testingMarcus Dempsey
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyCloudflare
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application SecurityCloudflare
 
AWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAmazon Web Services
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationPrecisely
 
Magento Security and Us
Magento Security and UsMagento Security and Us
Magento Security and UsLee Saferite
 
Server 2008 Project
Server 2008 ProjectServer 2008 Project
Server 2008 Projectwsolomoniv
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016Qrator Labs
 
Bulletproofing your account palcomtech
Bulletproofing your account palcomtechBulletproofing your account palcomtech
Bulletproofing your account palcomtechAlfons Tanujaya
 
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"MobileMonday Estonia
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshopkanimozhin
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...kanimozhin
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksCloudflare
 

Was ist angesagt? (20)

APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
 
Going outside the application
Going outside the applicationGoing outside the application
Going outside the application
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA System
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
 
PCI 3.0 and penetration testing
PCI 3.0 and penetration testingPCI 3.0 and penetration testing
PCI 3.0 and penetration testing
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
 
Latest Trends in Web Application Security
Latest Trends in Web Application SecurityLatest Trends in Web Application Security
Latest Trends in Web Application Security
 
AWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security Keynote
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security Configuration
 
Magento Security and Us
Magento Security and UsMagento Security and Us
Magento Security and Us
 
Server 2008 Project
Server 2008 ProjectServer 2008 Project
Server 2008 Project
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
Bulletproofing your account palcomtech
Bulletproofing your account palcomtechBulletproofing your account palcomtech
Bulletproofing your account palcomtech
 
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
 

Andere mochten auch

Manualwindows8 130523085145-phpapp01
Manualwindows8 130523085145-phpapp01Manualwindows8 130523085145-phpapp01
Manualwindows8 130523085145-phpapp01JuirleyLopezZambrano
 
Social Media For Business 2013
Social Media For Business 2013Social Media For Business 2013
Social Media For Business 2013Gummy Industries
 
Online advertising money: how do we spend it in 2014
Online advertising money: how do we spend it in 2014Online advertising money: how do we spend it in 2014
Online advertising money: how do we spend it in 2014Gummy Industries
 
Social media for product and furniture design
Social media for product and furniture designSocial media for product and furniture design
Social media for product and furniture designGummy Industries
 
How our heart works2
How our heart works2How our heart works2
How our heart works2saiydam
 
Actividad 2 emprendimiento
Actividad 2 emprendimientoActividad 2 emprendimiento
Actividad 2 emprendimientovanevico
 
Softengi тестирование программного обеспечения
Softengi тестирование программного обеспеченияSoftengi тестирование программного обеспечения
Softengi тестирование программного обеспеченияAlisa Kyryliuk
 
Le lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 3 - Social networksLe lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 3 - Social networksGummy Industries
 
Le lezioni di internet di gummy industries 4 - Propagazione
Le lezioni di internet di gummy industries 4 - PropagazioneLe lezioni di internet di gummy industries 4 - Propagazione
Le lezioni di internet di gummy industries 4 - PropagazioneGummy Industries
 
Social network per le istituzioni culturali
Social network per le istituzioni culturaliSocial network per le istituzioni culturali
Social network per le istituzioni culturaliGummy Industries
 

Andere mochten auch (20)

Manualwindows8 130523085145-phpapp01
Manualwindows8 130523085145-phpapp01Manualwindows8 130523085145-phpapp01
Manualwindows8 130523085145-phpapp01
 
MSTS Softengi
MSTS SoftengiMSTS Softengi
MSTS Softengi
 
Social Media For Business 2013
Social Media For Business 2013Social Media For Business 2013
Social Media For Business 2013
 
Online advertising money: how do we spend it in 2014
Online advertising money: how do we spend it in 2014Online advertising money: how do we spend it in 2014
Online advertising money: how do we spend it in 2014
 
Social media for product and furniture design
Social media for product and furniture designSocial media for product and furniture design
Social media for product and furniture design
 
How our heart works2
How our heart works2How our heart works2
How our heart works2
 
Proyecto Yulian Ingles
Proyecto Yulian InglesProyecto Yulian Ingles
Proyecto Yulian Ingles
 
Expo retie
Expo retieExpo retie
Expo retie
 
Actividad 2 emprendimiento
Actividad 2 emprendimientoActividad 2 emprendimiento
Actividad 2 emprendimiento
 
04 typography
04 typography04 typography
04 typography
 
Expo retie
Expo retieExpo retie
Expo retie
 
Softengi тестирование программного обеспечения
Softengi тестирование программного обеспеченияSoftengi тестирование программного обеспечения
Softengi тестирование программного обеспечения
 
Graphic Design Fields
Graphic Design FieldsGraphic Design Fields
Graphic Design Fields
 
U5_T2_AA1_Emmanuel Otamendi
U5_T2_AA1_Emmanuel OtamendiU5_T2_AA1_Emmanuel Otamendi
U5_T2_AA1_Emmanuel Otamendi
 
03 - meme - Abadir
03 - meme - Abadir03 - meme - Abadir
03 - meme - Abadir
 
Manual windows 8
Manual windows 8Manual windows 8
Manual windows 8
 
U7_T2_AA2_Emmanuel Otamendi
U7_T2_AA2_Emmanuel OtamendiU7_T2_AA2_Emmanuel Otamendi
U7_T2_AA2_Emmanuel Otamendi
 
Le lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 3 - Social networksLe lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 3 - Social networks
 
Le lezioni di internet di gummy industries 4 - Propagazione
Le lezioni di internet di gummy industries 4 - PropagazioneLe lezioni di internet di gummy industries 4 - Propagazione
Le lezioni di internet di gummy industries 4 - Propagazione
 
Social network per le istituzioni culturali
Social network per le istituzioni culturaliSocial network per le istituzioni culturali
Social network per le istituzioni culturali
 

Ähnlich wie SnapComms Technical Overview

AdroitLogic Product Portfolio
AdroitLogic Product PortfolioAdroitLogic Product Portfolio
AdroitLogic Product PortfolioAdroitLogic
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)APPSeCONNECT
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016Hameda Hurmat
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureMicrosoft Azure
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGSoftware AG South Africa
 
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Mike Taylor
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemInductive Automation
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 

Ähnlich wie SnapComms Technical Overview (20)

AdroitLogic Product Portfolio
AdroitLogic Product PortfolioAdroitLogic Product Portfolio
AdroitLogic Product Portfolio
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Vp ns
Vp nsVp ns
Vp ns
 
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
Webinar: Digital Transformation With Integration Platform as a Service (iPaaS)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
Chapter08
Chapter08Chapter08
Chapter08
 
An introduction and overview to Software as a Service
An introduction and overview to Software as a Service An introduction and overview to Software as a Service
An introduction and overview to Software as a Service
 
The Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft AzureThe Basics of Getting Started With Microsoft Azure
The Basics of Getting Started With Microsoft Azure
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AG
 
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

SnapComms Technical Overview

  • 2. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats INFO FOR YOU….INFO FOR Y Easy to install. Easy and quick to use. Measure delivery, click-throughs, responses.
  • 4. In a nutshell SnapComms… • is an HTTP based Client / Server pull technology. • has Clients for Windows, MAC, iOS and Android. • uses HTTP/HTTPS on customizable ports. • supports WAN links, VPNs & Proxies. • has SnapComms Hosted & local installation options. • is constantly tested and monitored for intrusion prevention • provides a high degree of data security • has one point of contact for support • is using brand able templates for content display
  • 5. The SnapComms Server… • is necessary for local installation only • is built with ASP.NET. • provides access to clients via a web service framework. • is supported on Win 2003 or higher. • works with SQL Server 2005 or higher. • requires IIS6 or higher. • comes with detailed installation documentation for applications and database. • includes extensive logging capabilities. • integrates Windows or Forms Authentication. • has detailed but easy to manage access control.
  • 6. The SnapComms Windows client… • is simple to deploy with MSI enabled deployment tools. • is supported on Windows XP / IE6 and higher. • encrypts it’s data storage. • integrates into Thin-Client environments like Citrix. • integrates with Active Directory. • has a minimal user Interface to minimize support.
  • 7. The Smartphone clients… • will be available Q2 2012 • work on iOS 3 / Android 2.1/ Blackberry 6 or higher • use a web service based API to access the server • support optional / additional push notifications • provide a simple, fully touch enabled UI • are fully brandable • can be easily pre-configured • install directly from the application market places
  • 8. The Network Connectivity… • is from ground up designed to be minimal. • ensures message content (including screensavers) is only downloaded once and cached (encrypted) on the client. • uses standard HTTP protocols. • works through all standard compliant proxies. • is secured through data encryption via HTTPS. • is routed through a single, configurable port to make it easy to pass firewalls. • works perfectly with VPN and WAN link setups.
  • 9. Active Directory Integration… • makes user, machine and group integration easy. • works fully transparent. • takes place on client side using standardized ADSI API. • doesn’t need to access to AD from the server • supports multiple domains/forests and nested groups. • collects only clearly specified attributes. • synchronizes the data periodically (6 hours default). • is cached encrypted on the client. • encrypts it’s data exchange with the server.
  • 10. SnapComms Security… • is a key policy. • has strong authentication and authorization processes. • includes secure data storage and data transfer. • is ensured by constant on going testing. • is tested with industry standard tools. • includes extensive intrusion testing. • minimizes the points of attack. • has well defined processes for quick escalation and counter measures.
  • 11. SnapComms Support & Monitoring… • operates 24 x 7. • provides one single point of contact for all enquiries. • has call escalation policies. • bases on clear and easy to understand SLA agreements. • works with industry standard support management tools. • has well defined issue escalation procedures and paths. • guarantees service availability for the hosted solution. • provides a guaranteed response time. • makes your life easier.
  • 12. References… • Overview of the SnapComms Architecture • SnapComms Client Deployment Overview • Thin Client Implementation • Integration with Active Directory • Assessment & Implementation of the Hosted Solution • Security Overview • Template Guidelines • Assessment & Implementation of a local installation • System Requirements for the locally installed solution • Implementation Tips