Q. Does 3-GIS integrate logs and metrics to enable traceability within our AWS services?
Q. Does 3-GIS utilize token or encryption services to protect data in transit and at rest?
A. Yes, we utilize token encryption in both cases. See a further
In transit encryption: Tokens can be acquired through either an HTTP GET or an HTTP POST. Using a POST is always more secure. GET requests may leave usernames/passwords in network equipment history and in the browser history. Esri APIs and products use POST when acquiring tokens.
At rest encryption: When ArcGIS Server is configured to use GIS-tier authentication, client applications ask the user for their username and passwords. Those client applications then send the username/password to ArcGIS Server and receive a token in exchange. That token can then be used on subsequent requests so that the username/password do not need to be sent.
Q. Does 3-GIS run regular security tests on customer's data stored in the cloud? What are the specifics such as time frame, etc?
A. We have a daily reporting from evident IO which analyses logs from AWS and notifies us if we have any violations of the AWS best practices. This is focused on network access which covers the data tier.
The Evident Security Platform is the first and only cloud-native infrastructure security solution providing full coverage of all AWS accounts, services and regions, services and standard regions. ESP combines the detection and analysis of misconfigurations, vulnerabilities, and risk, with guided remediation and audit capabilities to meet compliance requirements, all in one solution. ESP was designed specifically to help modern IT, DevOps and risk/compliance teams implement and maintain security within the cloud shared responsibility model. ESP enables IT, Security, Engineering, and Operations with a continuous global view of security risk and compliance, with the actionable intelligence needed to rapidly remediate and secure their entire AWS infrastructure. ESP gathers the AWS services configuration data, CloudTrail and
High: High severity alerts pose the most significant risk to your cloud deployment and should be examined and remediated as soon as possible.
Medium: A medium severity alert identifies issues that should be tracked and scheduled for remediation.
You have the ability to change the risk level for each security control check to match your organization’s security policy. Customer data is always encrypted during collection, in transit when inside our VPCs, and at rest in our data stores. At account termination your account and any data used to identify your infrastructure will be purged from our systems. Daily risk summary reports are emailed to ESP users identifying new risks from the last 24 hours and summarizing the previous alerts per account and service. Only specific ports are opened to the infrastructure, this is done via security groups and virtual private clouds.
Q. Does 3-GIS have access to the AWS Shared Responsibility Model?
A. Yes, see below.
Q. What are our credential management practices?
Q. What practices do we implement to define roles, responsibilities, and fine-grained authorization?
A. We manage permissions with groups, the benefits of doing this are:
A. There are scheduled outages but with minimum downtime.
A. 3-GIS monitors uptime and will notify customers of any unplanned outages.
A. Data can be exported from the application in KMZ, shapefile or file geodatabase formats. We can also give customers access to a database dump through secure FTP locations.
Q. Who is considered the "owner of the data"?
A. Technically, 3-GIS is the AWS Customer. 3-GIS customers retain full ownership and control of the content they store on AWS. AWS will not view, use or move customer content unless authorized by the customer.
Q. How does 3-GIS handle integration with other systems?
Q. What does a splice document deliverable look like?
A. Our splice documentation shows details about the splice, such as length of each cable, starting locations and ending locations of each path, and if any circuits are assigned the ID will display to the corresponding connection of that splice. Another benefit
Q. What does a bill of quantities/materials look like?
A. The BOM (Bill of Materials) tool is used to generate a list of materials costs for a project based on features and assemblies placed within a specified polygon feature. Polygons, assemblies, and costs are configured in 3-GIS Admin. Our BOM is customizable, for
Q. What types of GIS data files are compatible?
A. The following data types can be imported using the 3-GIS import feature:
The following data types can be imported/loaded through standard Esri data conversion and loading tools via hosted server access.
A. Any number of sources can be loaded into the system. The user has a
Users have access to any public Esri base map using 3-GIS | Web. Any map service or image service that is available via Esri REST can be referenced.
Current popular out of the box base maps include the following:
Q. Is a printable quality map product with an applicable legend available?
A. Our system is currently in use by dozens of engineering firms to generate the construction output necessary to attain permits. The system can also generate all the documents needed for crews to construct
3-GIS supports plotting
Q. Can 3-GIS be used with QGIS?
Q. Does the operator have full capability to create layers, style libraries, etc.?
A. Our admin software provides the capabilities to create and publish new layers and update symbology as needed. These services can also be provided by 3-GIS if needed.
Q. Is there an online forum for other users and troubleshooting?
A. 3-GIS has an online knowledge base that is accessible with your user ID and password, https://kb.3-gis.com. The knowledge base provides technical documentation to support tool configuration as well as user guides to help users understand tool functionality. The knowledge base is a live repository that is continually updated as new documentation is available.
Q. What training and courses are available?
A. Instructor-led training is available both onsite and online. The training can be customized to best meet the customers needs. All users have 24/7 access to the quick start online training courses. The courses are self-guided and cover all the features and functions of the 3-GIS core product. Users need to fill out this form to get login credentials.
Q. What does it take to switch over our current system and convert our data to 3-GIS?
A. 3-GIS has several processes from past data conversion projects that will aid in any data conversion required to transition your data into 3-GIS. An
Q. Is the software forward and
A. 3-GIS does support the ability to import CAD files. Data integrity is very important in this process. Controls on the CAD file production process will need to be in place to ensure the data that needs to be imported is delivered in the proper format. 3-GIS can export data that can be ingested
Q. What mistakes should be avoided during implementation?
A. Overthinking implementation is the number one mistake. When implementing 3-GIS | Network Solutions, don't approach with client-server architecture in mind. Consider a web-based architecture and consider how everyone in your enterprise will benefit from having the data instantly available on their desktop or mobile device. Click here for more information about our implementation process or watch our Onboarding made
Vereinbaren Sie eine Live-Demonstration und erfahren Sie mehr darüber, wie 3-GIS-Netzwerklösungen Ihrem Unternehmen helfen können