 |
Single-User vs.
Multi-User Versions: Comparison table
|
Features
|
Single-User version
|
Multi-User version
|
Product Name |
Program Name
|
Program Name + NT
|
Number of users |
1
|
1 - 1000
|
Upgradeable |
No
|
Yes, more users can be
added in future
|
System requirements |
-
Intel Pentium 166 MHz or higher
-
All versions of Microsoft Windows,
including 98, 2000, XP, Vista
-
128 Mb RAM
-
10 MB free hard disk space
-
SVGA or higher resolution monitor
-
Recommended screen resolution:
1024 x 768, Color depth: 256 colors
Mouse or other pointing device
|
-
Intel Pentium 166 MHz or higher
-
All versions of Microsoft Windows,
including 98, 2000, XP, Vista
-
128 Mb RAM
-
10 MB free hard disk space
-
SVGA or higher resolution monitor
-
Recommended screen resolution:
1024 x 768, Color depth: 256 colors
-
Mouse or other pointing device
-
LAN adapter 10 Mb (100 Mb recommended)
-
Database server MS SQL Server
2005 or MS SQL Server 2005 Express Edition (recommended from
10 and more users)
-
Josytal Database Applications
SharePoint (required)
|
Database type |
Single-file
|
Single-file or Database on
MS SQL Server |
Database access mechanism |
Single user, single database
on one computer, direct access to database |
Concurrent access to database
supported, many users can share a common database via local area network
Access to database via Josytal
Database Applications SharePoint. |
Database access privileges |
Read/Write/Delete/Print/Export
privileges for single user on single computer
|
***Advanced,
multi-factored
database security model. |
Database Records Isolation |
No.
|
Records isolation features
supported |
Bulk-EMailer
(where applicable) |
1 attachment file to message
|
Can attach as many files as
possible to message being sent |
Messages are stored directly
in the database
|
Messages are stored as files
on local hard disk on user computer. |
Price |
Low-cost
|
More expensive, due to development
costs/overheads |
***
Multi-factored
database security model. What is it?
According to recent Forrester
study, 80 percent of data security breaches involve insiders, employees
or those with internal access to an organization, putting information at
risk. The big challenge for companies today is to strike the right
balance between providing workers with appropriate access and protecting
sensitive information as much as possible.
Traditionally, database users
are assigned a database administrator (DBA) role or granted multiple system
privileges. Meaning, once a user has gained access to the database s/he
can manipulate (read, write, delete, export and print out) records without
any further restrictions. From information security point of view and research
studies, this is very, very risky. And you must be aware that this is the
approach most of our competitors use!
To help ensure the safety,
integrity and privacy of corporate information, Multi-User versions
of our software use comprehensive, multi-factored
database security approach. This approach is built on the defence-in-depth
principle, which introduces multiple mechanisms to augment the traditional
user and role security model. Simply put, restrictions and boundaries
are set up so that even employees with database access privileges MAY NOT
freely use, alter, export or print out sensitive information from the database.
How it works
1. Roles and Privileges boundaries. Administrator
may assign different combinations of privileges to different users on different
remote computers/workstations for manipulating records stored in the database
after gaining access. For example:
User #1 - Read/Write/Delete/Print/Export
User #2 - Read/Write/Print
User #3 - Read/Print
User #4 - Read only
User #5 - Read/Delete
User #6 - Read/Write
2. Records isolation. Administrator
may specify rules such that users will have access to and can manipulate
only the records they have added to the database. For example, a user's
tasks and schedules or his private correspondence.
Multi-factored database security
model is powered by our unique, specially built Josytal
Database Applications SharePoint
that serves as a single database point of entry
(server) and will handle as many as 1000 workstations/computers accessing
the database through the local network. After gaining access to the database,
Josytal
Database Applications SharePoint will monitor and enforce user's roles
and privileges granted to him/her by the administrator.
 |
 |
Setting multi-factored database security rules
via Josytal Database Applications SharePoint
|