Knowledge Base
Technical and Security Overview

Handheld Contact for Act! allows you to securely synchronize your phone and Act! database wirelessly using sophisticated syncing technology and quality software. Everything is developed and maintained in-house for maximum functionality and reliability.

Integrate with Act!

Install our computer application and configure it to integrate with an Act! database. It is a central administration console for user management and intelligently keeps the Act! database and all configured phones up-to-date.

Managing users

One user or many, each one is added and managed from a single Handheld Contact computer application installation.

Connecting the phone

Install our phone application and sign in with the user’s Handheld Contact account. The phone application will communicate with the computer application through the internet wirelessly and automatically import settings and sync Act! data.

Internet security

Information Handheld Contact transfers through the internet utilizes 2048 bit future proof SSL encryption. Every user requires a Handheld Contact account to securely link a user’s phone to the Act! database.

A quality experience

Our sync server, desktop computer applications, and phone applications are developed and maintained in-house. This gives us the control to deliver maximum reliability and security.

Sync service

Our wireless syncing server technology is a secure, central intermediary between the computer application and phone application. All data, new or modified, passes through the sync service and ensures that any changes made to data are efficiently synchronized.

Synced data

Synced data is deleted from our sync server once the customer’s phone and Act! database are updated. This is done for security reasons.

A simple hosted solution

Purchase a subscription for each user and that’s it. Each subscription includes free software upgrades and unlimited data transfer through our sync server.

 

Sync server physical and environmental security

Handheld Contact's sync service runs in world-class, state of the art data centers, utilizing innovative architectural and engineering approaches which make are 99.9% uptime possible. The data centers are housed in  nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic  means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and  continually escorted by authorized staff.

Our data centers only provides access and information to employees and contractors who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked. All physical access to data centers by staff is logged and audited routinely.

Fire Detection and Suppression

Automatic fire detection and suppression equipment has been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure  spaces, chiller rooms and generator equipment rooms. These areas are protected by either wet-pipe, double-interlocked pre-action, or gaseous sprinkler systems.

Power

The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back-up power in the event of an electrical failure for critical and essential loads in the facility.Data centers use generators to provide back-up power for the entire facility.

Climate and Temperature

Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain atmospheric conditions at optimal levels. Personnel and systems monitor and control temperature and humidity at appropriate levels.

Management

Electrical, mechanical, and life support systems and equipment are monitered so that any issues are immediately identified. Preventative maintenance is performed to maintain the continued operability of equipment.

Storage Device Decommissioning

When a storage device has reached the end of its useful life, procedures include a decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals. Techniques detailed in DoD 5220.22-M (“National Industrial Security Program Operating Manual “) or NIST 800-88 (“Guidelines for Media Sanitization”) is used to destroy data as part of the decommissioning process. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices.

 

PDF DOWNLOAD

(11 vote(s))
This article was helpful
This article was not helpful