Multi-user version frequantly asked questions

Single-User vs. Multi-User Versions: Comparison table

Features
Single-User version
Multi-User version
Product Name
Program Name
Program Name + NT
Number of users
1
1 - 1000
Upgradeable
No
Yes, more users can be added in future
System requirements
  • Intel Pentium 166 MHz or higher
  • All versions of Microsoft Windows, including 98, 2000, XP, Vista
  • 128 Mb RAM
  • 10 MB free hard disk space
  • SVGA or higher resolution monitor
  • Recommended screen resolution: 1024 x 768, Color depth: 256 colors

  • Mouse or other pointing device
  • Intel Pentium 166 MHz or higher
  • All versions of Microsoft Windows, including 98, 2000, XP, Vista
  • 128 Mb RAM
  • 10 MB free hard disk space
  • SVGA or higher resolution monitor
  • Recommended screen resolution: 1024 x 768, Color depth: 256 colors
  • Mouse or other pointing device
  • LAN adapter 10 Mb (100 Mb recommended)
  • Database server MS SQL Server 2005  or  MS SQL Server 2005 Express Edition (recommended from 10 and more users)
  • Josytal Database Applications SharePoint (required)
Database type
Single-file
Single-file or Database on MS SQL Server
Database access mechanism Single user, single database on one computer, direct access to database Concurrent access to database supported, many users can share a common database via local area network 

Access to database via Josytal Database Applications SharePoint.

Database access privileges
Read/Write/Delete/Print/Export privileges for single user on single computer
***Advanced, multi-factored database security model. 
Database Records Isolation
No.
Records isolation features supported
Bulk-EMailer 
(where applicable)
1 attachment file to message
Can attach as many files as possible to message being sent
Messages are stored directly in the database
Messages are stored as files on local hard disk on user computer.
Price
Low-cost
More expensive, due to development costs/overheads

***
Multi-factored database security model. What is it?
According to recent Forrester study, 80 percent of data security breaches involve insiders, employees or those with internal access to an organization, putting information at risk. The big challenge for companies today  is to strike the right balance between providing workers with appropriate access and protecting sensitive information as much as possible.

Traditionally, database users are assigned a database administrator (DBA) role or granted multiple system privileges. Meaning, once a user has gained access to the database s/he can manipulate (read, write, delete, export and print out) records without any further restrictions. From information security point of view and research studies, this is very, very risky. And you must be aware that this is the approach most of our competitors use!

To help ensure the safety, integrity and privacy of corporate information, Multi-User versions of our software use comprehensive, multi-factored database security approach. This approach is built on the defence-in-depth principle, which introduces multiple mechanisms to augment the traditional user and role security model. Simply put,  restrictions and boundaries are set up so that even employees with database access privileges MAY NOT freely use, alter, export or print out sensitive information from the database.

How it works

1. Roles and Privileges boundaries. Administrator may assign different combinations of privileges to different users on different remote computers/workstations for manipulating records stored in the database after gaining access. For example:

2. Records isolation. Administrator may specify rules such that users will have access to and can manipulate only the records they have added to the database. For example, a user's tasks and schedules or his private correspondence.

Multi-factored database security model is powered by our unique, specially built Josytal Database Applications SharePoint
that serves as a single database point of entry (server) and will handle as many as 1000 workstations/computers accessing the database through the local network. After gaining access to the database, Josytal Database Applications SharePoint will monitor and enforce user's roles and privileges granted to him/her by the administrator.
 

Setting multi-factored database security rules via Josytal Database Applications SharePoint