Anonymousprnt::Y

Security

When choosing a workspace management system, you may not have considered whether or not it is secure.

However, once security becomes a live issue for you, it is probably already too late - your system has already been hacked, sensitive information stolen, or data is being held to ransom and you now face a world of pain and recriminations…

A booking system that can be hacked is a potential commercial disaster for any company - don’t risk it!

We built the Door Tablet system with comprehensive security features in mind, not as a mere afterthought or bolt-on like others.  Enhanced security elements have always been integrated into both our software and our purpose-built hardware.

We are proud that a wide variety of data-sensitive companies around the world trust Door Tablet.  These include ARM, PwC, Raytheon, Thales, Lloyds Bank and many more. 

Maximum System Security

Door Tablet runs only on your premises or in your private cloud, so you have complete security control of your system.

By only running on-premise and/or in your private cloud as a single tenant system (never multi-tenant), Door Tablet ensures that no one has access to your data at all.

We do not have to promise you that “your data is safe with us” because we never have your data in the first place.

You always have full control of the Door Tablet system.  It runs solely on your infrastructure and/or your cloud.  Door Tablet will never be a “weak link” within your software ecosystem.

Administrator Security

System administrators have full control of the Door Tablet system and can finetune the levels of security and authorizations.  The administrator can enable or disable security features as needed, including booking and meeting information security, ensuring room business rules.

End-user Security

Door Tablet offers different levels of authentication and authorizations for users.  Security restrictions can be applied at:
  • System level
  • Device level – individual rooms or groups of rooms
You decide what functions are enabled for different rooms.  For example, you may want to block a specific touchscreen from being used to book rooms unless the user is authorized.

You decide which rooms are available, at what time and where these rooms may be booked – from the booking system, or solely on the touchscreens outside the room. 

Different users can be allocated different booking privileges via PIN numbers or RFD/NFC.

Room Security

The Door Tablet system alerts the room booker when uninvited users check into a room.  If door unlocking is enabled, Door Tablet can physically restrict room entry depending on authentication.  We supply a General Purpose Input Output (GPIO) Device that works with your own existing magnetic door locking mechanism.  Rooms can then be simply unlocked by PIN passcode or RFID/ NFC.

Server Stability and Fail-safes

As well as being a secure environment, Door Tablet has robust system durability.  By taking advantage of multiple servers, the Door Tablet servers can replicate each other, providing powerful redundancy.  If one server goes down, all the endpoints notice and they automatically switch to an alternate server, maintaining seamless functionality.  After this event, the system will try to revert back to the original server, at 10 minutes intervals, to maintain load balancing.  

Confidentiality

Security and confidentiality go hand in hand.  Sometimes you may not want visitors or employees to know who is coming to a meeting or what a meeting is about.  Administrators are in complete control of what information the system will show to certain users or on display devices.

All Door Tablet layouts are fully customizable which means that you can decide how much detail you want to show.  This discretion can also be applied to all our Wayfinding services.

Hardware Security

Door Tablet runs opaque on the network - by default our devices do not respond to any information other than the Door Tablet server.

No on-device credentials storage

Our software does not store usernames or passwords – so if they are stolen, they cannot be used to inflict harm on the organization.  All information is stored solely on the Door Tablet server - not any end-points.  We recommend selecting our robust, purpose-built displays to take advantage of their extended security features.

Single purpose device

Since all our devices are purpose-built to be used only with Door Tablet, they have no value to the casual thief.  Unlike an iPad or a Samsung Galaxy tablet, our devices do not have resale value and are not a temptation for dishonest people.

Hard to remove

Even if someone is tempted, our devices are hard to steal because secure wall mounts and 3M stick tack make it nearly impossible to remove them.

Security-hardened hardware

We offer “hardened” versions of our devices that are classified to handle a Rogue Admin.  This applies to the Door Tablet AIO, TC and LS.

Hardened devices are built so that no one can gain physical access to them via ports or interfaces, which is especially important for banks and security conscious organizations.  This hardening of the units ensures no sensitive eavesdropping devices or other malware can be installed on our devices.  Like all our Door Tablet products, our hardened devices work “out of the box”.

Summary of Security Features

  • Runs only on your premises or in your private cloud - you have complete security control of your system
  • Administrator-controlled security features include:
    • Booking security/privileges
    • Room and meeting security for entry
    • Built-in server stability and fail-safes
    • Confidentiality ensured at device and user level
  • Enhanced hardware security features of our own devices:
    • No on-device password storage
    • Single purpose device
    • Hard to steal
    • Hardened hardware available “out of the box” for maximum security settings