Command Center is a specialized Management Information System and platform, like an ERP or a reporting suite. Like those other types of Management Information System, Command Center requires setup, customization, and training. We include these with every new Command Center implementation, but we can’t offer trial accounts in advance of this setup and training service. However, if you would like to see your own data in Command Center, we can book a demo time to input some sample information together to give you insight into how Command Center can work for you.
Yes. Command Center is a cloud-native application run on Cloud Foundry, a fast and secure application delivery platform. This means you don’t have software to install or a server to maintain, and you can access your Command Center account on any computer as long as you have an internet connection, a browser, and your login credentials.
The Command Center database is a SQL database run on Amazon’s Amazon Web Services zoned in the USA. We maintain several different levels of backups to make sure that the right amount of information can be restored depending on the situation.
• Nightly Backups: maximum 2 weeks history (counting from yesterday)
• Sunday Backups: maximum 3 months history (counting from yesterday)
• Monthly Backups (1st Sunday of each month): maximum 1 year history
Physical backups are stored redundantly, with the primary backup location in Virginia, USA, and the secondary backup location in California, USA.
Very easily. Access to Command Center and all data contents is password-protected and role-based.
Access to all protected contents is provided based on individual user roles through named user accounts protected by password. User roles define the scope of authority which each user is granted within a Customer’s database. Likewise, the actual processing functions are granted/denied access by role-based security. Each module, function, routine, screen, and menu in Command Center has been customized for each defined role.
By granting your team access within defined roles, you can ensure that each individual can only see and do what you want them to.
Command Center uses a robust internet technology called Hypertext Transfer Protocol Secure (https), which is a combination of the Hypertext Transfer Protocol (HTTP) with the Secure Socket Layer (SSL)/Transport Layer Security (TLS) protocol. TLS is an authentication and security protocol widely implemented in browsers and Web servers. This provides security and credibility for Command Center access.
The Command Center database is encrypted at rest and in transit using AES-256 cryptography, meaning your data is protected from prying eyes by industry-standard security technology.
Command Center maintains a “transaction log” or “audit log” for all mission-critical stored data. This allows a “before and after” representation of each change which is enacted upon a customer’s dataset. In addition to the before and after values, the audit log records the date, time, and currently logged-in user for the change. This provides a complete record of change for your data. You can access and use your audit log within Command Center to monitor, demonstrate information chain-of-custody, or even simply correct typo mistakes.