Security Compliance
Client to Client encryption
Reports are aes256 encrypted when generated, and only decrypted once downloaded by the receiver of the report.
Secure login
Even if it's in theory not possible to decrypt the report without the full client url, the tech looking at the report still needs to have a valid account linked to the upload token of the client, and the login is secured by 2FA, and can be set up to only allow certain IPs / use a VPN
Review process
The user has to review the generated report before sending it, to make sure that no sensitive information is being sent with the screen recording.
Easy report deletion
Once a report has been downloaded, it can easily be shared even without access to our servers with the local file, the tech can then delete it easily to avoid any risk
Flexibility
Our tool is capable of working in three ways for the report sharing:
1 - the report is uploaded to our server
2 - the report is uploaded to your server (on prem hosting)
3 - the report is uploaded to a third party service or shared as a file
On prem deployment
The system is built with the intent to be hosted anywhere, even without internet access. This means that it can be deployed on-site to avoid the risk of any data breach from our servers