NEXYTE product description Page 12
8 System Administration
NEXYTE’s administration package provides flexible resource administration abilities while enforcing
a secured and segmentized environment. This enables the openness for third party interfaces and
micro-service add-ons, while also supported segmentized user access to data, collaboration and
information sharing, and full user auditing. The system’s strict security measures comply with
industry standards and allow the organization to focus on investigation objectives with peace of
mind.
8.1 User Management, Case Access, and Secure
Collaboration
Users access and activity permissions are determined according to role, case assignment and source
type. These define the cases and types of investigative activities that each analyst can perform.
Role-based permissions determine the tasks and actions that the specific user can perform, while
the assigned cases and source types determine the permitted domains of investigation and
clearance levels.
NEXYTE applies secure information management mechanisms and case management policies that
ensure full compartmentalization on one hand, together with safe collaboration tools for reporting,
alert dissemination and data export on the other. Personnel assigned to the same case have access
to the case materials, and to collaboration tools for information sharing:
+ Collaborative case management allows personnel access to the case contents, where suspect
details, events, profiles, research summaries, and reports are available.
+ System messaging tool allows users to send and receive messages, and share information
based on predefined security policies.
Template-based report and summary tools provide easily tailored formats, allowing analysts to
extract a comprehensive and aggregated overview of the investigation contents. The generated
report includes a visualized output of the case, together with related content, summaries and
insights. The report can then be disseminated to relevant departments or decision makers, in a
standard readable format.
As part of the case investigation environment, NEXYTE ensures a strict yet adaptable control of data
access management, user data access and auditing of user actions. Stringent security controls
manage each step of the data ingestion, user data access, investigation and collaboration process,
based on the understanding that the system’s security factor must comply with zero tolerance
requirements. Acting upon these guidelines, NEXYTE offers the following range of security
mechanisms:
+ Secure source integration. Access authentication and security mechanisms enable multiple
sources from different organizations to be securely integrated.
+ Content access control and secured classified content. Data is controlled by user access
permissions ensuring each item is accessed by authorized users only. Multi-level control
mechanisms control access permissions at source levels that comply with the system’s