|
|
Unlimited Period; Limited User's Licenses, I Collaborator Enterprise Trial with all Features |
|
|
|
|
|
|
|
Integrated into MS Office |
|
Powerful Workspaces |
|
Co-browsing |
|
Web Conferencing |
|
Automated Updates |
Know more about USP |
|
|
|
|
|
|
I Collaborator SamePage APIs allow for integration into most existing software.- MS Exchange, Lotus Notes, ILM Systems, Document Management System, PLM, ERP, SFA, CRM, etc... |
|
Know more about Integration |
|
|
|
|
|
|
|
|
|
|
Home Page --> Security |
|
“Everytime we turn around, there's another communication method that needs securing…” Posting on a forum. |
|
|
|
Introduction to Enterprise Security |
|
Security is the lynchpin of every organization. The teams that fortify the Enterprise and manage its security, play the most critical role in ensuring optimal business performance.
Security threats come in various, ingenious digital guises – viruses, worms, Trojan Horses, spyware, bots, etc – these are often maliciously programmed to propagate for maximum damage. The impact could result in irritating pop-ups, system freezes to more serious such as hijacking of a system, transmitting keystrokes, erasing data, propagating itself via address books, emails, documents, file transfers, etc.
I Collaborator SamePage takes a holistic approach towards Security. First, we believe, that our customers should not be forced to buy yet another security software or system – using the existing software, processes & systems I Collaborator SamePage will fit into them; enhancing ROI on earlier investments. Further, stretched resources do not need to learn and understand yet another security software.
For non-digital threat mitigation, I Collaborator SamePage offers Strong Passwords, User Authentication, Chinese Walls, Granular User Rights, etc. Further custom controls for higher security organizations can be provided. |
|
Encryption |
|
All messages and files exchanged through I Collaborator SamePage are encrypted. I Collaborator SamePage uses Asymmetric Algorithm and public/private keys for file transfer and textual communications. With the decryption key being sent via a different channel; the use of “signatures” makes it nearly impossible to intercept, reconstruct and read the packets. |
|
File Security |
|
For optimal use of network resources, I Collaborator SamePage compresses files. For sanctity of the file, I Collaborator SamePage encrypts them using a dynamic key generator that is packaged with file information as a signature and sent to the user. Using the dynamic key generation, it is not possible to identify which key is for encryption and which is for decryption; this provides an unprecedented level of security. |
|
Server Security |
|
I Collaborator SamePage File Transfer Server stores files in a compressed and encrypted format. A database stores key metrics and the decryption key for the file (for auditing, compliance, etc); only the original sender, recipient and the Super Administrator can access the file. I Collaborator SamePage File Transfer server is protected by strong passwords keeping unauthorized snoopers at bay. |
|
Viruses |
|
I Collaborator SamePage is generally safe from propagation of viruses via file transfers since the system can be customized to run files through (existing) anti virus / spy ware, then compress it, secure it and send it on to the intended user. |
|
Content Controls |
|
I Collaborator SamePage is configurable to prevent users from sending specific file types (e.g. .exe). |
|
Collusion |
|
Other than external threats, collusion has been found to be a key factor in compromising the sanctity of the enterprise. I Collaborator SamePage incorporates Chinese Walls, and this also aids in Regulatory Compliance. |
|
User Authentication |
|
All users of I Collaborator SamePage must use strong passwords which can be integrated with the enterprise user directory or native I Collaborator SamePage user rights management system. |
|
User Rights Management |
|
The super administrator assigns all primary Group Rights; the super administrator can assign system administrator rights. User rights and privileges can be managed at a granular level including of file types, and the system administrator can do this. The system administrator does not have the privilege of accessing logs of communications or files. |
|
Extensibility |
|
I Collaborator SamePage provides unparalleled extensibility and integration options and this can help achieve your unique needs for security. |
|
|
|
|
|
|