NEXYTE product description Page 12 8 System Administration NEXYTE’s administration package provides flexible resource administration abilities while enforcing a secured and segmentized environment. This enables the openness for third party interfaces and micro-service add-ons, while also supported segmentized user access to data, collaboration and information sharing, and full user auditing. The system’s strict security measures comply with industry standards and allow the organization to focus on investigation objectives with peace of mind. 8.1 User Management, Case Access, and Secure Collaboration Users access and activity permissions are determined according to role, case assignment and source type. These define the cases and types of investigative activities that each analyst can perform. Role-based permissions determine the tasks and actions that the specific user can perform, while the assigned cases and source types determine the permitted domains of investigation and clearance levels. NEXYTE applies secure information management mechanisms and case management policies that ensure full compartmentalization on one hand, together with safe collaboration tools for reporting, alert dissemination and data export on the other. Personnel assigned to the same case have access to the case materials, and to collaboration tools for information sharing: + Collaborative case management allows personnel access to the case contents, where suspect details, events, profiles, research summaries, and reports are available. + System messaging tool allows users to send and receive messages, and share information based on predefined security policies. Template-based report and summary tools provide easily tailored formats, allowing analysts to extract a comprehensive and aggregated overview of the investigation contents. The generated report includes a visualized output of the case, together with related content, summaries and insights. The report can then be disseminated to relevant departments or decision makers, in a standard readable format. As part of the case investigation environment, NEXYTE ensures a strict yet adaptable control of data access management, user data access and auditing of user actions. Stringent security controls manage each step of the data ingestion, user data access, investigation and collaboration process, based on the understanding that the system’s security factor must comply with zero tolerance requirements. Acting upon these guidelines, NEXYTE offers the following range of security mechanisms: + Secure source integration. Access authentication and security mechanisms enable multiple sources from different organizations to be securely integrated. + Content access control and secured classified content. Data is controlled by user access permissions ensuring each item is accessed by authorized users only. Multi-level control mechanisms control access permissions at source levels that comply with the system’s