Technical Brief v1.0
Communication tools that broadcast visual content
           directly onto the screens of computers,
              using multiple channels and formats




                                                INFO FOR YOU….INFO FOR Y




  Easy to install. Easy and quick to use.
Measure delivery, click-throughs, responses.
Communication Tools
In a nutshell SnapComms…
  •   is an HTTP based Client / Server pull technology.
  •   has Clients for Windows, MAC, iOS and Android.
  •   uses HTTP/HTTPS on customizable ports.
  •   supports WAN links, VPNs & Proxies.
  •   has SnapComms Hosted & local installation options.
  •   is constantly tested and monitored for intrusion prevention
  •   provides a high degree of data security
  •   has one point of contact for support
  •   is using brand able templates for content display
The SnapComms Server…
 •   is necessary for local installation only
 •   is built with ASP.NET.
 •   provides access to clients via a web service framework.
 •   is supported on Win 2003 or higher.
 •   works with SQL Server 2005 or higher.
 •   requires IIS6 or higher.
 •   comes with detailed installation documentation for
     applications and database.
 •   includes extensive logging capabilities.
 •   integrates Windows or Forms Authentication.
 •   has detailed but easy to manage access control.
The SnapComms Windows client…

 •   is simple to deploy with MSI enabled
     deployment tools.
 •   is supported on Windows XP / IE6 and higher.
 •   encrypts it’s data storage.
 •   integrates into Thin-Client environments like
     Citrix.
 •   integrates with Active Directory.
 •   has a minimal user Interface to minimize
     support.
The Smartphone clients…

 •   will be available Q2 2012
 •   work on iOS 3 / Android 2.1/ Blackberry 6 or
     higher
 •   use a web service based API to access the
     server
 •   support optional / additional push notifications
 •   provide a simple, fully touch enabled UI
 •   are fully brandable
 •   can be easily pre-configured
 •   install directly from the application market
     places
The Network Connectivity…
 •   is from ground up designed to be minimal.
 •   ensures message content (including
     screensavers) is only downloaded once and
     cached (encrypted) on the client.
 •   uses standard HTTP protocols.
 •   works through all standard compliant proxies.
 •   is secured through data encryption via HTTPS.
 •   is routed through a single, configurable port to
     make it easy to pass firewalls.
 •   works perfectly with VPN and WAN link setups.
Active Directory Integration…
 •   makes user, machine and group integration easy.
 •   works fully transparent.
 •   takes place on client side using standardized
     ADSI API.
 •   doesn’t need to access to AD from the server
 •   supports multiple domains/forests and nested
     groups.
 •   collects only clearly specified attributes.
 •   synchronizes the data periodically (6 hours
     default).
 •   is cached encrypted on the client.
 •   encrypts it’s data exchange with the server.
SnapComms Security…
•   is a key policy.
•   has strong authentication and authorization
    processes.
•   includes secure data storage and data transfer.
•   is ensured by constant on going testing.
•   is tested with industry standard tools.
•   includes extensive intrusion testing.
•   minimizes the points of attack.
•   has well defined processes for quick escalation
    and counter measures.
SnapComms Support & Monitoring…

 •   operates 24 x 7.
 •   provides one single point of contact for all enquiries.
 •   has call escalation policies.
 •   bases on clear and easy to understand SLA
     agreements.
 •   works with industry standard support management
     tools.
 •   has well defined issue escalation procedures and
     paths.
 •   guarantees service availability for the hosted solution.
 •   provides a guaranteed response time.
 •   makes your life easier.
References…
 •   Overview of the SnapComms Architecture
 •   SnapComms Client Deployment Overview
 •   Thin Client Implementation
 •   Integration with Active Directory
 •   Assessment & Implementation of the Hosted Solution
 •   Security Overview
 •   Template Guidelines
 •   Assessment & Implementation of a local installation
 •   System Requirements for the locally installed solution
 •   Implementation Tips

More Related Content

PDF
Training Webinar: Cover your bases - a security webinar
PDF
CSF18 - GDPR - Sami Laiho
PDF
Hardening a SQL Server 2008 Implementation
PDF
4 palo alto licenses
PDF
11 palo alto user-id concepts
PDF
Nicolas destor pres_f5agility2018
PPTX
Basic security and Barracuda VRS
PPT
12 steps to_cloud_security
Training Webinar: Cover your bases - a security webinar
CSF18 - GDPR - Sami Laiho
Hardening a SQL Server 2008 Implementation
4 palo alto licenses
11 palo alto user-id concepts
Nicolas destor pres_f5agility2018
Basic security and Barracuda VRS
12 steps to_cloud_security

What's hot (19)

PDF
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
PPTX
Going outside the application
PPTX
Designing A Platform Agnostic HA System
PDF
3 palo alto ngfw architecture overview
PPTX
PCI 3.0 and penetration testing
PDF
Hardening Microservices Security: Building a Layered Defense Strategy
PPTX
Latest Trends in Web Application Security
PPTX
Hyper Secure Converged Infrastructure solves architectural challenges
PPTX
Essential Layers of IBM i Security: IBM i Security Configuration
PPTX
Magento Security and Us
PPTX
Server 2008 Project
PDF
Network Security in 2016
PDF
Bulletproofing your account palcomtech
PDF
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
PPTX
Techcello hp-arch workshop
PPTX
Building multi tenant highly secured applications on .net for any cloud - dem...
PDF
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
PDF
Password Express - Data Sheet
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
Going outside the application
Designing A Platform Agnostic HA System
3 palo alto ngfw architecture overview
PCI 3.0 and penetration testing
Hardening Microservices Security: Building a Layered Defense Strategy
Latest Trends in Web Application Security
Hyper Secure Converged Infrastructure solves architectural challenges
Essential Layers of IBM i Security: IBM i Security Configuration
Magento Security and Us
Server 2008 Project
Network Security in 2016
Bulletproofing your account palcomtech
Indrek Saar: "Mobile Application Server-Side Security Peculiarities"
Techcello hp-arch workshop
Building multi tenant highly secured applications on .net for any cloud - dem...
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
Password Express - Data Sheet
Ad

Viewers also liked (20)

PPTX
Manualwindows8 130523085145-phpapp01
PDF
MSTS Softengi
PDF
Social Media For Business 2013
PDF
Online advertising money: how do we spend it in 2014
PDF
Social media for product and furniture design
PPTX
How our heart works2
PPTX
Proyecto Yulian Ingles
PPTX
Expo retie
PDF
Actividad 2 emprendimiento
PDF
04 typography
PPTX
Expo retie
PPTX
Softengi тестирование программного обеспечения
PDF
Graphic Design Fields
PPTX
U5_T2_AA1_Emmanuel Otamendi
PDF
03 - meme - Abadir
PPTX
Manual windows 8
PPTX
U7_T2_AA2_Emmanuel Otamendi
PDF
Le lezioni di internet di gummy industries 3 - Social networks
PDF
Le lezioni di internet di gummy industries 4 - Propagazione
PDF
Social network per le istituzioni culturali
Manualwindows8 130523085145-phpapp01
MSTS Softengi
Social Media For Business 2013
Online advertising money: how do we spend it in 2014
Social media for product and furniture design
How our heart works2
Proyecto Yulian Ingles
Expo retie
Actividad 2 emprendimiento
04 typography
Expo retie
Softengi тестирование программного обеспечения
Graphic Design Fields
U5_T2_AA1_Emmanuel Otamendi
03 - meme - Abadir
Manual windows 8
U7_T2_AA2_Emmanuel Otamendi
Le lezioni di internet di gummy industries 3 - Social networks
Le lezioni di internet di gummy industries 4 - Propagazione
Social network per le istituzioni culturali
Ad

Similar to SnapComms Technical Overview (20)

PPTX
Clavister security for virtualized environment
PDF
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
PDF
cWizard Overview
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
CyberoamNGFWTechSheet
PDF
NETFLOW ANALYZER 9600 - AN OVERVIEW
PDF
XTM moving security forward
PPTX
Orascom-tehnical study final
PPT
F5 BigIP v9.ppt
PDF
Cyberoam cr200ing
PDF
Cyberoam cr200ing
PPTX
Network and Cloud Security Improvements
PDF
PPTX
Beka v2 - copy
PPTX
Sophos utm-roadshow-south africa-2012
PDF
Help Now Guardian Network
PPTX
OpManager - A smart alternative to complex network management frameworks
Clavister security for virtualized environment
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
cWizard Overview
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
CyberoamNGFWTechSheet
NETFLOW ANALYZER 9600 - AN OVERVIEW
XTM moving security forward
Orascom-tehnical study final
F5 BigIP v9.ppt
Cyberoam cr200ing
Cyberoam cr200ing
Network and Cloud Security Improvements
Beka v2 - copy
Sophos utm-roadshow-south africa-2012
Help Now Guardian Network
OpManager - A smart alternative to complex network management frameworks

Recently uploaded (20)

PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
Five Habits of High-Impact Board Members
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A review of recent deep learning applications in wood surface defect identifi...
Module 1 Introduction to Web Programming .pptx
The influence of sentiment analysis in enhancing early warning system model f...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
sbt 2.0: go big (Scala Days 2025 edition)
A proposed approach for plagiarism detection in Myanmar Unicode text
OpenACC and Open Hackathons Monthly Highlights July 2025
Improvisation in detection of pomegranate leaf disease using transfer learni...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Comparative analysis of machine learning models for fake news detection in so...
Module 1.ppt Iot fundamentals and Architecture
Consumable AI The What, Why & How for Small Teams.pdf
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Basics of Cloud Computing - Cloud Ecosystem
Enhancing plagiarism detection using data pre-processing and machine learning...
Build Your First AI Agent with UiPath.pptx
The various Industrial Revolutions .pptx
Five Habits of High-Impact Board Members
How ambidextrous entrepreneurial leaders react to the artificial intelligence...

SnapComms Technical Overview

  • 2. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats INFO FOR YOU….INFO FOR Y Easy to install. Easy and quick to use. Measure delivery, click-throughs, responses.
  • 4. In a nutshell SnapComms… • is an HTTP based Client / Server pull technology. • has Clients for Windows, MAC, iOS and Android. • uses HTTP/HTTPS on customizable ports. • supports WAN links, VPNs & Proxies. • has SnapComms Hosted & local installation options. • is constantly tested and monitored for intrusion prevention • provides a high degree of data security • has one point of contact for support • is using brand able templates for content display
  • 5. The SnapComms Server… • is necessary for local installation only • is built with ASP.NET. • provides access to clients via a web service framework. • is supported on Win 2003 or higher. • works with SQL Server 2005 or higher. • requires IIS6 or higher. • comes with detailed installation documentation for applications and database. • includes extensive logging capabilities. • integrates Windows or Forms Authentication. • has detailed but easy to manage access control.
  • 6. The SnapComms Windows client… • is simple to deploy with MSI enabled deployment tools. • is supported on Windows XP / IE6 and higher. • encrypts it’s data storage. • integrates into Thin-Client environments like Citrix. • integrates with Active Directory. • has a minimal user Interface to minimize support.
  • 7. The Smartphone clients… • will be available Q2 2012 • work on iOS 3 / Android 2.1/ Blackberry 6 or higher • use a web service based API to access the server • support optional / additional push notifications • provide a simple, fully touch enabled UI • are fully brandable • can be easily pre-configured • install directly from the application market places
  • 8. The Network Connectivity… • is from ground up designed to be minimal. • ensures message content (including screensavers) is only downloaded once and cached (encrypted) on the client. • uses standard HTTP protocols. • works through all standard compliant proxies. • is secured through data encryption via HTTPS. • is routed through a single, configurable port to make it easy to pass firewalls. • works perfectly with VPN and WAN link setups.
  • 9. Active Directory Integration… • makes user, machine and group integration easy. • works fully transparent. • takes place on client side using standardized ADSI API. • doesn’t need to access to AD from the server • supports multiple domains/forests and nested groups. • collects only clearly specified attributes. • synchronizes the data periodically (6 hours default). • is cached encrypted on the client. • encrypts it’s data exchange with the server.
  • 10. SnapComms Security… • is a key policy. • has strong authentication and authorization processes. • includes secure data storage and data transfer. • is ensured by constant on going testing. • is tested with industry standard tools. • includes extensive intrusion testing. • minimizes the points of attack. • has well defined processes for quick escalation and counter measures.
  • 11. SnapComms Support & Monitoring… • operates 24 x 7. • provides one single point of contact for all enquiries. • has call escalation policies. • bases on clear and easy to understand SLA agreements. • works with industry standard support management tools. • has well defined issue escalation procedures and paths. • guarantees service availability for the hosted solution. • provides a guaranteed response time. • makes your life easier.
  • 12. References… • Overview of the SnapComms Architecture • SnapComms Client Deployment Overview • Thin Client Implementation • Integration with Active Directory • Assessment & Implementation of the Hosted Solution • Security Overview • Template Guidelines • Assessment & Implementation of a local installation • System Requirements for the locally installed solution • Implementation Tips