Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To help contextualise each of these areas further, the diagram below provides an overview of the solution we will explore in more detail.

...

 

Info

piDashboard Software

Our origins stem from the heavily regulated, demanding requirements of financial services, with a key focus on data security and compliance. 

...

Configuring Panintelligence at a role and user level involves defining roles and permissions, assigning users to roles, and reviewing and adjusting the configuration as necessary. With role-based access controls, customers can ensure that users have the appropriate level of access to the Panintelligence software, based on their role and responsibilities within the organization. 

 

 

Info

piSaaS Hosted Solution

Panintelligence offers a secure Software as a Service (SaaS) solution that ensures the safety of customer data. Here are the key security features that ensure the safety of customer data: 

...

  1. Finally, logs are created and maintained by the application. Access to these logs is limited to Cloud, Support, and Professional Services teams to maintain confidentiality.   

 

Info

Automated Licence Manager

Panintelligence provisions licenses and aggregates customer usage data through its Automated License Manager (ALM) system. When a customer purchases a license, they receive a license key that is used to activate the software. With the ALM system in place, the license key is automatically provisioned to the customer's account and is managed remotely. 

...

Access to the usage logs is limited to the Support Services and Customer Success teams to ensure confidentiality. 

 

Info

Support & Professional Services

Controlling access to the Pi software is crucial to maintaining security and preventing unauthorized access to the software or customer data. However, there may be instances where customers need to provide access to Panintelligence in order to receive support services. In such cases, it's important for customers to consider additional security measures to protect their data. 

...