NEXYTE product description Page 13
user level requirements. This ensures data is used for authorized purposes only, by
approved personnel.
+ User level permissions and lawful compliance. User permissions determine for each and
every user their source permissions, access level (Create/Edit/Delete), and which
functions they can perform (searches, data modeling, print, etc.). Strict access and usage
permissions ensure investigators comply with all privacy and civil liberty laws.
+ Secure information sharing. Content and information can be securely shared while access
permissions are enforced.
+ User authentication. Different authentication sources can be implemented including
integration of enterprise LDAP. Organizations can retain existing enterprise authentication
systems or implement NEXYTE’s authentication system.
+ User audit. The system logs and stores each data access, search, investigation and analysis
action (export, print, create investigation, link or user, etc.) performed by all of the users.
Auditing allows the tracking of data usage – not limited only to actions of a specific user
but also general tracking of how a data item has been used, by whom and for what
purposes.
+ Active security model. Regular security models often bind security permissions to content
upon data ingestion, demanding heavy re-binding processes in the event of changes in the
definition of permissions. Others use late binding techniques, where security permissions
are bound upon content retrieval. In this case, content is retrieved wholly and only later
filtered, which in case of error may result in a breach of security. The system implements a
unique active security algorithm which supports a flexible and safe security model, with
no performance reduction.
NEXYTE active security mechanism uses unique query-time join technique that binds security
permissions during the initial retrieval action, which results in high flexibility for permission changes
and no risk of retrieving unauthorized content.
8.1.1 Permissions
NEXYTE employs a fine-grained permissions model to manage levels of access permissions to data.
Strict access and usage permissions ensure analysts and investigators comply with privacy regulations.
Permissions are enforced on three axes:
Data source – Defining the data sources from which a specific user can view data.
Classification – Defining for each user the maximum classification level they are allowed to view.
Investigation – In addition, it is possible to define specific investigations to which only selected users
and groups are assigned.
Every item of information is related to a specific data source and is defined with a classification. Every
user is entitled to view specific data sources and will not be able to view data coming from sources
which he does not have permissions for. In addition, every user has a classification and will be able to
see information that has an equal or lower classification level.