Information Security Capability
Information security is critical to any organisation but with security and law enforcement there are additional levels of security that need to be implemented. It can be complex, confusing and time consuming task to set organisation wide security levels.
The SAS platform combines a granular approach to security settings with easy to configure logic.
There are three tiers of security
1. User based – access to information needs to be controlled and restricted, based on user profiles
2. Role base – individual personnel information requirements are accommodated according to their role and responsibility
3. Asset based – access on a files, record and document level can be appropriately managed to protect sources, people, other investigations
You need an information security capability which:
- Manages and mitigates risk
- Adapts to different users with different information access rights
- Is robust and easy to set up
- Has enterprise ready security levels
The SAS information security capability provides a full response to all of the above points. It also incorporates powerful audit functionality for organisations to track access requests, including searches.
A robust supervisory and security model, SAS allows organisations to easily set required security and access levels.
Additionally, our data integration allows the system security to work as part of multi-organisational operations against common threats.
Three unique benefits of SAS Security:
1. Embeds security restrictions in data itself – information may be partially presented to a user, i.e. they can see results but sections have been removed. They may also, if desired, be able to search and find information but not view it. A secondary action can be taken where a user was not shown information simply due to security, and if that may have influenced their decision, another user can be notified
2. Reduced data storage requirements – This speeds up searching and avoids expensive data storage space. The Memex system actively shrinks data though conversion to a total-content-index
3. Various security levels – Security can operate at various levels, from and including user security within groups applied to the application and to the individual servers, then onto database levels, to data access applied to individual records, including covert and protected levels of record security