Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Access CAM: CAM is accessed over HTTPS from any modern browser.

  • Access to client on-premises Database: CAM does not make any changes to your on-premises database and access to the database is restricted to authorized roles only.

  • Data Encryption in Transit and Rest: All the data in transit and rest are encrypted. CAM ensures robust data protection across endpoints and networks to protect data in both states.

  • Virtual Private Cloud: The data servers are placed in a secure private sub-net that cannot be accessed from the internet.

  • High Data Availability / Disaster Recovery: AWS has a worldwide network of data centers and data is replicated across different regions. This speeds up the availability of your data by connecting you to the nearest data center location and retrieving data faster. This in turn ensures data is always available and avoids any negative impact due to service outages or natural disasters.

  • Data Sync: CAM can be configured to continuously sync data from your on-premises database to the cloud. This ensures a live cloud copy of your data is always available in case of any service outages.

  • SOC 2 certification: Prosperoware Litera is in the process of obtaining SOC 2 certification that for CAM directly which will further confirm our service is specifically designed and managed to maintain the highest level of data security. Litera does have ISO 27000.1 certification for its products.

  • Scalability: CAM is designed to scale out and handle variable workloads and peaks in activity without impact on performance.

...

  • SAML-based SSO (Single Sign On): SAML authentication is the process of verifying the user’s identity and credentials. It provides a very secure method of passing user authentications and authorizations between the identity provider and CAM. All CAM users are authenticated and sessions are audited within the application. CAM has a strong Identity and Access Management solution (IAM) that prevents any unauthorized users from connecting to the system.

  • Data Access Control: CAM provides role-based access control to set user / group-specific access and editing permissions for data.

  • Monitor User Activity: CAM allows you to monitor and generate reports to track any irregular user activities such as the mass download of data or cabinets and workspaces regularly accessed and updated.

For more security info check out the FAQ: CAM Security FAQ