NEXYTE product description Page 18
+ Data Flow Controls. NEXYTE architecture ensures that users have no direct access to the
database records or to storage files. Only approved data access operations via the
business logic layer can be performed, and users can access only their assigned cases,
entities and content types according to the system's permission management.
+ Network Separation. The system's network is sub-netted to separate client workstations
from the servers and computers. By doing so, NEXYTE safeguards its servers, and
potentially the organization’s network, from malware infections incurred by the
workstation.
+ User Rights and Workstation Access. Only authorized personnel are allowed to access
NEXYTE workstations, and each analyst can access only their own assigned cases.
+ Single Sign-On. Enables users to securely access all workstation applications using a single
set of user authentication credentials.
+ Auditing. Auditing capabilities allow administrators and managers to follow-up and
monitor all user activities, specific activities per investigation, entities, etc. Administrators
can view the audit trail by running a query regarding a specific user and/or a date range.