|
Single-User vs. Multi-User Versions: Comparison table |
|
|
|
Product Name |
|
|
Number of users |
|
|
Upgradeable |
|
|
System requirements |
Mouse or other pointing device |
|
Database type |
|
Single-file or Database on MS SQL Server |
Database access mechanism | Single user, single database on one computer, direct access to database | Concurrent access to database
supported, many users can share a common database via local area network
Access to database via Josytal Database Applications SharePoint. |
Database access privileges |
|
***Advanced, multi-factored database security model. |
Database Records Isolation |
|
Records isolation features supported |
Bulk-EMailer
(where applicable) |
|
Can attach as many files as possible to message being sent |
|
Messages are stored as files on local hard disk on user computer. | |
Price |
|
More expensive, due to development costs/overheads |
Traditionally, database users are assigned a database administrator (DBA) role or granted multiple system privileges. Meaning, once a user has gained access to the database s/he can manipulate (read, write, delete, export and print out) records without any further restrictions. From information security point of view and research studies, this is very, very risky. And you must be aware that this is the approach most of our competitors use!
To help ensure the safety, integrity and privacy of corporate information, Multi-User versions of our software use comprehensive, multi-factored database security approach. This approach is built on the defence-in-depth principle, which introduces multiple mechanisms to augment the traditional user and role security model. Simply put, restrictions and boundaries are set up so that even employees with database access privileges MAY NOT freely use, alter, export or print out sensitive information from the database.
How it works
1. Roles and Privileges boundaries. Administrator may assign different combinations of privileges to different users on different remote computers/workstations for manipulating records stored in the database after gaining access. For example:
Multi-factored database security
model is powered by our unique, specially built Josytal
Database Applications SharePoint
that serves as a single database point of entry
(server) and will handle as many as 1000 workstations/computers accessing
the database through the local network. After gaining access to the database,
Josytal
Database Applications SharePoint will monitor and enforce user's roles
and privileges granted to him/her by the administrator.
|
|
|||||