Yes, we utilize token encryption in both cases. See a further
In transit encryption: Tokens can be acquired through either an HTTP GET or an HTTP POST. Using a POST is always more secure. GET requests may leave usernames/passwords in network equipment history and in the browser history. Esri APIs and products use POST when acquiring tokens.
At rest encryption: When ArcGIS Server is configured to use GIS-tier authentication, client applications ask the user for their username and passwords. Those client applications then send the username/password to ArcGIS Server and receive a token in exchange. That token can then be used on subsequent requests so that the username/password do not need to be sent.
We have a daily reporting from evident IO which analyses logs from AWS and notifies us if we have any violations of the AWS best practices. This is focused on network access which covers the data tier.
The Evident Security Platform is the first and only cloud-native infrastructure security solution providing full coverage of all AWS accounts, services and regions, services and standard regions. ESP combines the detection and analysis of misconfigurations, vulnerabilities, and risk, with guided remediation and audit capabilities to meet compliance requirements, all in one solution. ESP was designed specifically to help modern IT, DevOps and risk/compliance teams implement and maintain security within the cloud shared responsibility model. ESP enables IT, Security, Engineering, and Operations with a continuous global view of security risk and compliance, with the actionable intelligence needed to rapidly remediate and secure their entire AWS infrastructure. ESP gathers the AWS services configuration data, CloudTrail and
High: High severity alerts pose the most significant risk to your cloud deployment and should be examined and remediated as soon as possible.
Medium: A medium severity alert identifies issues that should be tracked and scheduled for remediation.
You have the ability to change the risk level for each security control check to match your organization’s security policy. Customer data is always encrypted during collection, in transit when inside our VPCs, and at rest in our data stores. At account
Yes, see below.
All users of the system are managed VIA MS Active directory using a standard protocol.
We manage permissions with groups, the benefits of doing this are:
We will work with each customer to define their priorities and implement backup policies and disaster recovery architecture.
There are scheduled outages but with minimum downtime.
3-GIS monitors uptime and will notify customers of any unplanned outages.
Data can be exported from the application in KMZ, shapefile or file geodatabase formats. We can also give customers access to a database dump through secure FTP locations.
Technically, 3-GIS is the AWS Customer. 3-GIS customers retain full ownership and control of the content they store on AWS. AWS will not view, use or move customer content unless authorized by the customer.
3-GIS Network Solutions is designed on a Service Oriented Architecture and is Web 2.0 compliant, making integration straight-forward.
Our splice documentation shows details about the splice, such as length of each cable, starting locations and ending locations of each path, and if any circuits are assigned the ID will display to the corresponding connection of that splice. Another benefit
The BOM (Bill of Materials) tool is used to generate a list of materials costs for a project based on features and assemblies placed within a specified polygon feature. Polygons, assemblies, and costs are configured in
The following data types can be imported using the 3-GIS import feature:
The following data types can be imported/loaded through standard Esri data conversion and loading tools via hosted server access.
Any number of sources can be loaded into the system. The user has a
Users have access to any public Esri base map using 3-GIS | Web. Any map service or image service that is available via Esri REST can be referenced.
Current popular out of the box base maps include the following:
Our system is currently in use by dozens of engineering firms to generate the construction output necessary to attain permits. The system can also generate all the documents needed for crews to construct
3-GIS supports plotting
Our data can be exported into a GDB and KMZ which can be used by the QGIS system.
Our admin software provides the capabilities to create and publish new layers and update symbology as needed. These services can also be provided by 3-GIS if needed.
3-GIS has an online knowledge base that is accessible with your user ID and password, https://kb.3-gis.com. The knowledge base provides technical documentation to support tool configuration as well as user guides to help users understand tool functionality. The knowledge base is a live repository that is continually updated as new documentation is available.
Instructor-led training is available both onsite and online. The training can be customized to best meet the customers needs. All users have 24/7 access to the quick start online training courses. The courses are self-guided and cover all the features and functions of the 3-GIS core product. Users need to fill out this form to get login credentials.
3-GIS has several processes from past data conversion projects that will aid in any data conversion required to transition your data into 3-GIS. An
3-GIS does support the ability to import CAD files. Data integrity is very important in this process. Controls on the CAD file production process will need to be in place to ensure the data that needs to be imported is delivered in the proper format. 3-GIS can export data that can be ingested
Overthinking implementation is the number one mistake. When implementing 3-GIS | Network Solutions, don't approach with client-server architecture in mind. Consider a web-based architecture and consider how everyone in your enterprise will benefit from having the data instantly available on their desktop or mobile device. Learn more about our implementation process or watch our Onboarding made easy webinar.
Schedule a live demo and learn about how 3-GIS network solutions can help your business