FiberTrace is a specialized Management Information System and platform, like an ERP or a reporting suite. Like those other types of Management Information System, FiberTrace requires setup, customization, and training. We include these with every new FiberTrace implementation, but we can’t offer trial accounts in advance of this setup and training service. However, if you would like to see your own data in FiberTrace, we can book a demo time to input some sample information together to give you insight into how FiberTrace can work for you.
Yes. FiberTrace is a cloud-native application run on Cloud Foundry, a fast and secure application delivery platform. This means you don’t have software to install or a server to maintain, and you can access your FiberTrace account on any computer as long as you have an internet connection, a browser, and your login credentials.
The FiberTrace database is a SQL database run on Amazon’s Amazon Web Services zoned in the USA. We maintain several different levels of backups to make sure that the right amount of information can be restored depending on the situation.
• Nightly Backups: maximum 2 weeks history (counting from yesterday)
• Sunday Backups: maximum 3 months history (counting from yesterday)
• Monthly Backups (1st Sunday of each month): maximum 1 year history
Physical backups are stored redundantly, with the primary backup location in Virginia, USA, and the secondary backup location in California, USA.
Very easily. Access to FiberTrace and all data contents is password-protected and role-based.
Access to all protected contents is provided based on individual user roles through named user accounts protected by password. User roles define the scope of authority which each user is granted within a Customer’s database. Likewise, the actual processing functions are granted/denied access by role-based security. Each module, function, routine, screen, and menu in FiberTrace has been customized for each defined role.
By granting your team access within defined roles, you can ensure that each individual can only see and do what you want them to.
FiberTrace uses a robust internet technology called Hypertext Transfer Protocol Secure (https), which is a combination of the Hypertext Transfer Protocol (HTTP) with the Secure Socket Layer (SSL)/Transport Layer Security (TLS) protocol. TLS is an authentication and security protocol widely implemented in browsers and Web servers. This provides security and credibility for FiberTrace access.
The FiberTrace database is encrypted at rest and in transit using AES-256 cryptography, meaning your data is protected from prying eyes by industry-standard security technology.
FiberTrace maintains a “transaction log” or “audit log” for all mission-critical stored data. This allows a “before and after” representation of each change which is enacted upon a customer’s dataset. In addition to the before and after values, the audit log records the date, time, and currently logged-in user for the change. This provides a complete record of change for your data. You can access and use your audit log within FiberTrace to monitor, demonstrate information chain-of-custody, or even simply correct typo mistakes.