Legalesign Service Definition Electronic signature and contract management service
|
|
|
- Damon Gray
- 10 years ago
- Views:
Transcription
1 Legalesign Service Definition Electronic signature and contract management service Legalesign Limited UN House, 4 Hunter Square, Edinburgh, EH1 1QW Tel: @legalesign.com Overview Legalesign is an accessible online document signing and contract management service. It enables your contracts to be signed immediately from anywhere and for your organisation to organise, track and centrally manage those contracts rapidly and easily. The service is available through a website or an application programming interface (API). Legalesign is highly evolved to minimise the lifetime costs of using esignature software. Typically esignature software by itself creates large efficiency savings over alternatives and Legalesign s approach compounds this key benefit for our customers over the long term: Highly reliable - investment is biased toward infrastructure to minimise downtime (uptime is 99.9%); Adaptability the feature set is highly versatile to handle many different contract types and signing situations as they occur in your organisation; Easily scalable - a unique and highly scalable system architecture that enables the platform to rapidly and easily adapt to your organisational change over time; On-going efficiency improvements - a methodology of continuous improvement is used to deliver continuing and measurable efficiency improvements based on real-life scenarios from customers. Anyone can use Legalesign is designed around being intuitive and usable for the least tech-savvy person, so everyone can access it and training time is minimal; most users need no training or less than a few minutes from a colleague to get started. Online signing reduces the time to completion for your contracts, increases the number of contracts closed (against sending for a wet ink signature) and frees signers from the pain of having to print, sign, scan and return your documents. 1 st October
2 Aside from the paper-saving environmental benefits, the benefits for organisations include having documents securely stored, sent in moments and tracked in real-time. Administration time, and cost, becomes significantly lower, the score for human error is reduced and contracts can be centrally monitored and controlled. The service is used by businesses across the UK including solicitors, insurance companies, accountants, a NHS body and others. The sizes of firms that use the service range from single person businesses to large multi-nationals. Getting started & Implementation A free trial is available from the website and on-boarding will take no more than five minutes. Your first step will be to create a group or team and add users as required. There are a full set of permissions to control the access rights and privileges of your users. Upon access, the system has walk-through explanatory information to inform you (and each new user) how to use features on each part of the site. Following that, support and training are available. Users upload a document (text, Word or PDF) that, subject to permissions, can be shared with other members of the team. After upload, fields can be added to the document that can either be edited upon sending (i.e. you can set up a generic template that can be repeatedly sent with its content customised for each signer), or set as form fields for signer(s) to complete any forms on the document. A document can be sent to multiple signers. The user sends the document out to signer(s) in a few moments and the document is tracked in real-time: when the is sent, viewed, document opened, form fields complete and signed. Full notifications are also available to inform users when a document is viewed or signed. The signing process has been studied over 1000 s of transactions and optimised to be easy and straightforward. After signing the document history (or audit trail ) is embedded in the document and the document is converted to standards compliant PDF, which is non-repudiable by being fully certified to the Adobe Certified Document Service level which includes long term validation (LTV). 1 st October
3 Legalesign is highly versatile and extensive settings are available so the system can be customised to the preferences of the administrator(s) or individual users. All forward-facing communications and web pages sent or shown to signers can be customised and branded as required. The system s underlying team-based structure makes it straightforward to scale up through a large organisation, and for it to be easily adapted in line with organisational change over time. New teams can be added on demand. A team is a duplicated fresh copy of the system with additional multi-team management features. Legalesign s structure is also designed around change management practices to facilitate smooth rollout across a large organisation. The multi-team management features enable central visibility over documents across teams while being able to silo teams according to users access permissions and responsibilities. API access is included in the trial and is fully featured but restricted (there is a limit on who documents can be sent to). A trial key can be obtained from the user s personal settings page which is clearly marked on the website. Training Legalesign offers three one-to-one webinars of up to an hour. In addition, support is available during business hours for any immediate queries. Legalesign is made for team use and is therefore designed for easy usability by the least technically minded person. For the API, the support team is available for any questions and assistance for coding. A user dashboard is available for API users to review past requests which include debug error messages. The API documentation can be found at Security Each user must create their own password to access the service. In addition, they can optionally set up two-factor authentication using a personally held device (e.g. mobile phone) that generates rotating PIN codes. Team administrators can select to improve their organisation s security by requiring their users to create passwords that are more complex and to force their users to reset their password every month (or less frequently if preferred). Administrators can easily retire individual users from groups with immediate revocation of access. Password brute force 1 st October
4 protection is built-in. All passwords are securely hashed in storage (and data is encrypted at rest). All communications with the website are encrypted. The SSL certificate and SSL configuration is A graded by Qualsys. Aged SSL protocol are disabled. The system supports Perfect Forward Secrecy. All data is encrypted at rest. We operate a suite of ongoing security tools and methodologies for example, constant monitoring including intrusion detection and integrity checking, file checks, scans and file encryption. Access is strictly limited and controlled. While we have counter-measures for attacks on passwords, please make sure your own password is a good one (8 or more characters, mixed digit/letter and upper/lower case), and we recommend changing it intermittently. Technical requirements The service can be accessed from mobile phone, tablet or PC, and functions across all major web browsers. Internet Explorer 9 and above are supported. But users are encouraged to use the latest versions of browsers for the best experience, besides the wider security benefits gained from keeping their software updated. Technical details Legalesign uses Amazon Web Service (AWS) for its cloud infrastructure with storage and processing based in the United States. The service is a member of SafeHarbor and so relevant EU data privacy protection rights are followed. AWS has extensive compliance in place including ISO27001 and ISO9001, more details can be found at ISO27001 certification for Legalesign is anticipated for November The service is designed to be highly fault tolerant by using a highly reliable and fully redundant architecture, that scales upon demand. The service can be briefly unavailable during scheduled downtime for service updates and important servicing works. We give at least two weeks notice, unless a critical update is required, and will only carry out this during off-peak hours, usually UTC. Uptime for the service is currently 99.9%. 1 st October
5 Business continuity Data is replicated across standby machines located in multiple isolated resources in near real-time and frequent point in time backups are taken to ensure seamless failover to alternate resources in the event of individual failures. Data is stored in both a highly available and fully redundant way. Despite extensive backup routines we would always recommend you store copies of your signed documents on your own systems too. For disaster events back-up is on-going to a separate cloud infrastructure in a different geographic area. Ordering and Cancellation Purchase - The service can be purchased on a monthly basis (annual invoicing available upon request). Payment can be made by automated debit at the start of each month, or we can issue an invoice with credit terms of 30 days. If you need to set up a purchase order please communicate with support. Cancellation - To cancel the account the nominated account holder can inform us at anytime in writing. There is no cancellation cost. Thereafter the facility to send documents will expire at the end of that billing month. Documents can still be accessed after termination but cannot be sent. Removal of data - After termination deletion of documents and a full removal of all data is available upon request at cost, otherwise Legalesign engineers periodically purge data for closed accounts (at no cost) but only after approval from the account holder. More information & Contact Details Visit or us at @legalesign.com or call st October
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Vendor Questions. esignatures Request for information InsureSign
InsureSign Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.
White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)
Data Storage That Looks at Business the Way You Do. Up. cloud
Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides
G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements
1 G-Cloud Framework Document for Service Definition Audit management System In response to G Cloud 6 Requirements 1 2 Table of Content Audit Management System Minimize the Risk 1.The Audit management System.........
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
onesource workflow manager
onesource workflow manager for Wealth Management TAX & ACCOUNTING improve processes for full compliance The more efficient your office, the better you can serve your clients and comply with regulations.
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
Cloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
FTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Amazon Relational Database Service (RDS)
Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon
IBM esignature overview
IBM esignature overview Signing IBM Agreements using IBM esignature Sign your IBM Agreements using IBM esignature Signing contracts using electronic signatures eliminates the hassles of pen and paper and
Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere
OneDrive for Business with Hosted SharePoint Secure UK Cloud Document Management from Your Office Anywhere Cloud Storage is commonplace but for businesses that want secure UK Cloud based document and records
Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition
Involve Cloud Video Conferencing Service VC:me (Video Conferencing: made easy) Service Definition Contents 1. Service Overview... 3 Reservations Service... 4 Endpoint Management... 4 Reporting... 4 Testing...
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW
HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION With e-signlive, Silanis hosted service, you can invite other people to conveniently and securely sign documents over the web. Your documents can be easily signed
Security Features: Lettings & Property Management Software
Security Features: Lettings & Property Management Software V 2.0 (23/02/2015) Table of Contents Introduction to Web Application Security... 2 Potential Security Vulnerabilities for Web Applications...
SNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
The Pension Portal. Helping you take your pension business into the paperless age
The Pension Portal Helping you take your pension business into the paperless age When you ve been helping pension professionals implement client portals for as long as we have, you understand that the
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
BENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
Data Storage that Looks at Business the Way You Do. Up. cloud
Data Storage that Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides
Dooblo SurveyToGo: Security Overview
Dooblo SurveyToGo: Security Overview May, 2012 Written by: Dooblo Page 1 of 10 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...
M-Files QMS. Out-of-the-Box Solution for Daily Quality Management
M-Files QMS Out-of-the-Box Solution for Daily Quality Management Topics How we see Quality Management Benefits of a dedicated QMS M-Files QMS system essentials Built-in electronic and digital signing QMS
Product Overview. What s New in NAV 2016
Product Overview What s New in NAV 2016 Reference: NAV/What s New/2016 Contents 1 New in NAV 2016... 1 2 Technology... 2 3 Ease of Use... 4 4 Functionality... 8 5 Summary... 12 Version No: 1.0 (i) 1 New
Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you
Webrecs IT infrastructure The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you Sunday, April 21, 2013 Contents Introduction... 3 Data storage... 3 Data Centres...
Amazon Compute - EC2 and Related Services
Amazon Compute - EC2 and Related Services G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon
Hydrant E-Learning Management System (HELMS)
Hydrant E-Learning Management System (HELMS) service definition v6.1 Page 1 Service overview Hydrant offer an e-learning Management System (HELMS) on which a variety of e-learning solutions can be built
ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.
ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators. Overview of ShareSync Easy, intuitive sharing and syncing ShareSync
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Business process efficiency is improved with task management, alerts, notifications and automated process workflows.
UNCLASSIFIED 23/02/2015 v3.3 Cobweb Hosted SharePoint 3.0 Service Description Cobweb Hosted SharePoint is a web-based document collaboration tool that helps you maximise productivity in a truly flexible,
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
Learning Management Redefined. Acadox Infrastructure & Architecture
Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing
All your apps & data in the cloud, all in one place.
The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access
IDGARD - Easy, Safe, Compliant
IDGARD - Easy, Safe, Compliant IDGARD App Features IDGARD What Does it Do? IDGARD is a service that protects internal & external business communication and data exchange: It s easy, safe, and compliant.
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
QA Software. a new way to view qa. Centralized, cloud-based data for easy management of TG-142 reporting. QA Pilot
QA Software a new way to view qa Centralized, cloud-based data for easy management of TG-142 reporting QA Pilot All clinics are tasked with recording, reporting and archiving vast amounts of data to document
<workers> Online Claims and Injury Management
Global Resources... Local Knowledge With over 30 years experience in workers compensation, our claims management systems have been adopted by Self-Insured Organisations, Third Party Administrators and
How To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
An Overview of the Product Features
An Overview of the Product Features pg. 1 GMP Property Professional System Information v 1.7 2014 CLOUD-BASED SOFTWARE FEATURES Most browsers are compatible with the GMP functionality Google Chrome is
OpenStack Private Cloud Hosting in an Tier 3 Data Centre. G-Cloud Lot 1 IaaS
OpenStack Private Cloud Hosting in an Tier 3 Data Centre This is service provides a dedicated private cloud environment built on the open source technology, OpenStack. This is service provides a dedicated
Mobile Application Development Platform Comparison
Mobile Application Development Platform Comparison Unvired Inc. Disclaimer: This document has been prepared based on publicly available data of other platform vendors and is subject to change. Comparison
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Microsoft Exchange Online from BT. Service Description (Shared Platform)
Microsoft Exchange Online from BT Version 5.1 January 2004 Confidentiality statement All information contained in this document is provided in confidence for the sole purpose of adjudication, and shall
Security and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
YOUR SECURE ONLINE VAULT. DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH [email protected] +41 44 515 11 11 www.securesafe.com
YOUR SECURE ONLINE VAULT DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH [email protected] +41 44 515 11 11 www.securesafe.com SECURESAFE PRIVACY MANIFESTO We have embedded privacy directly into the design
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Vendor Questions. esignatures Request for information - RightSignature
Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing Ceremony
Egnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
Service Definition Easysite Web CMS
Service Definition Easysite Web CMS Easysite Web Content Management System G-Cloud III Service Definition Easysite Web Content Management System Contents 1 Service Easysite Web Content Management System...
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
Cloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
// your essential partner CLOUD
Benefit from business continuity with real-time replication of applications and data to a secure container in the cloud, which can be called into action within minutes. Protecting and ensuring the recoverability
COLLEAGUES. CLIENTS. CONNECTED. CLOUD.
COLLEAGUES. CLIENTS. CONNECTED. CLOUD. THOMSON REUTERS Simplifying your life with powerful, integrated and innovative solutions. The Tax & Accounting business of Thomson Reuters provides the profession
Accellion Security FAQ
A N A C C E L L I O N W H I T E P A P E R Accellion Security FAQ Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA 94303 [email protected]
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
Your Business Doesn t Fit a Mold; Neither Should Your Software. Why Your Facility Needs CMMS Software. FaciliWorks 8i Web-based CMMS.
Why Your Facility Needs CMMS Software Improve productivity Control operations and maintenance costs Maximize asset uptime Prevent mistakes Become proactive Avoid legal obligations and liability Reduce
How To Use Ncr Aptra Clear
NCR APTRA CLEAR National payment hub for clearing and settlement Shifting payment dynamics: The international scope Every country has some form of unique payment system based on its own financial practices,
i9advantage.com 800.724.8546 Be confident of complete compliance, while experiencing the most innovative, mobile-enabled I-9 software solutions.
Be confident of complete compliance, while experiencing the most innovative, mobile-enabled I-9 software solutions. Meet I-9 Advantage TM. The only cloud-based, mobile-enabled platform. 800.724.8546 i9advantage.com
G Cloud Service Description Premier SIP Trunk Software as a Service October 2015
G Cloud Service Description Premier SIP Trunk Software as a Service October 2015 Premier Choice Telecom has been a trusted provider of communications solutions for businesses for over 15 years. Our clients
Agilisys G-Cloud Service V
Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform
Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Comparing ShareFile and Egnyte. White Paper
White Paper Revised July, 2013 Introduction The advent of cloud file sharing allows IT to provide easy file access and collaboration for users. But with so many file sharing solutions, what features and
BUILT FOR YOU. Contents. Cloudmore Exchange
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud
Druva Phoenix: Enterprise-Class Data Security & Privacy in the Cloud Advanced, multi-layer security to provide the highest level of protection for today's enterprise. Table of Contents Overview...3 Cloud
UDiMan. Introduction. Benefits: Name: UDiMan Identity Management service. Service Type: Software as a Service (SaaS Lot 3)
UDiMan Name: UDiMan Identity Management service Service Type: Software as a Service (SaaS Lot 3) Introduction UDiMan is an Enterprise Identity Management solution supporting mission critical authentication
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
Easy, practical and affordable
Easy, practical and affordable Piilo software is focused on making talent and human capital management easy, practical and affordable for small, medium and large businesses. Piilo software helps you manage
Frequently Asked Questions
Frequently Asked Questions Overview QUESTIONS AT A GLANCE Overview Cloud-based Solutions Project Management Risk Management Results Management Trial, Licensing & Plans Data, Storage & Retention Data Migration
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Enterprise Private Cloud Storage
Enterprise Private Cloud Storage The term cloud storage seems to have acquired many definitions. At Cloud Leverage, we define cloud storage as an enterprise-class file server located in multiple geographically
Loveurope Online Operating Platform (LOOP)
Loveurope Online Operating Platform (LOOP) The Loveurope Online Operating Platform (LOOP) is our central client MIS portal. Standard functionality and features are offered to all contracted clients as
SuiteCRM Customer Relationship Management System
SuiteCRM Customer Relationship Management System Overview SalesAgility is an ISO9001-accredited professional services consultancy engaged in transforming the business needs of our clients into robust and
Document control for sensitive company information and large complex projects.
Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive
mobile connect mobileconnect A complete software, hardware and managed service solution for mobile workers
Do you want to: Deploy a wide range of applications quickly and easily? Streamline your processes and optimise the efficiency of your workers? Save time and money whilst boosting productivity? If so, the
