Technical and Security Overview
Handheld Contact for Act! allows you to securely synchronize your phone and Act! database wirelessly using sophisticated syncing technology and quality software. Everything is developed and maintained in-house for maximum functionality and reliability.
Integrate with Act!
Install our computer application and configure it to integrate with an Act! database. It is a central administration console for user management and intelligently keeps the Act! database and all configured phones up-to-date.
One user or many, each one is added and managed from a single Handheld Contact computer application installation.
Connecting the phone
Install our phone application and sign in with the user’s Handheld Contact account. The phone application will communicate with the computer application through the internet wirelessly and automatically import settings and sync Act! data.
Information Handheld Contact transfers through the internet utilizes 2048 bit future proof SSL encryption. Every user requires a Handheld Contact account to securely link a user’s phone to the Act! database.
A quality experience
Our sync server, desktop computer applications, and phone applications are developed and maintained in-house. This gives us the control to deliver maximum reliability and security.
Our wireless syncing server technology is a secure, central intermediary between the computer application and phone application. All data, new or modified, passes through the sync service and ensures that any changes made to data are efficiently synchronized.
Synced data is deleted from our sync server once the customer’s phone and Act! database are updated. This is done for security reasons.
A simple hosted solution
Purchase a subscription for each user and that’s it. Each subscription includes free software upgrades and unlimited data transfer through our sync server.
Sync server physical and environmental security
Handheld Contact's sync service runs in world-class, state of the art data centers, utilizing innovative architectural and engineering approaches which make are 99.9% uptime possible. The data centers are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.
Fire Detection and Suppression
Automatic fire detection and suppression equipment has been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms and generator equipment rooms. These areas are protected by either wet-pipe, double-interlocked pre-action, or gaseous sprinkler systems.
The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back-up power in the event of an electrical failure for critical and essential loads in the facility.Data centers use generators to provide back-up power for the entire facility.
Climate and Temperature
Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain atmospheric conditions at optimal levels. Personnel and systems monitor and control temperature and humidity at appropriate levels.
Electrical, mechanical, and life support systems and equipment are monitered so that any issues are immediately identified. Preventative maintenance is performed to maintain the continued operability of equipment.
Storage Device Decommissioning
When a storage device has reached the end of its useful life, procedures include a decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals. Techniques detailed in DoD 5220.22-M (“National Industrial Security Program Operating Manual “) or NIST 800-88 (“Guidelines for Media Sanitization”) is used to destroy data as part of the decommissioning process. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices.