Adavico

Client Portal

ADAVICO provides clients with 24/7 access to an online portal to securely send, receive, and store files. This password-protected area allows users to organize documents in a centralized location, and to exchange files that are too large to e-mail. And because protecting your data is so vitally important, we have taken careful measures to ensure our extranet service provider is professionally managed and hosted with best-of-breed facilities and servers.

Accessibility

Accessing confidential data is convenient - all that's needed is a web browser. The opening of additional ports or the installation of special software is not required. Establishing individual user accounts and permission levels is easy and does not require your time or IT resources.

Security

Security and reliability are our top priorities. Unlike FTP, passwords and files are transferred using SSL encryption for privacy. Forgotten passwords can be reset using a built-in mechanism to keep your projects moving forward.

File Management

A number of value-added features contribute to the ease of use and management of your portal:

  1. Quick and easy keyword file and folder searches
  2. Request and upload files with a hyperlink
  3. Send and download files with a hyperlink
  4. File upload/download notifications
  5. Folder-level user permissions

Data Center Facts:

  1. Professionally managed by Windstream Hosted Solutions and Amazon Web Services
  2. Ballistic-proof exterior, including doors & windows
  3. SSAE 16 audited data centers
  4. Fingerprint scanners and ID checking for all entry and exit of the facility
  5. Double man traps force double verification and provides extra secure data center entry
  6. Redundant off-site monitoring of all security systems
  7. Locked cabinets and cages

Server Security Facts:

  1. Latest firewalls and computer internet security updates
  2. 256-bit Secure Socket Layer (SSL) encryption of all communications
  3. Stored files encrypted while at rest
  4. Unique user logins and hashed passwords
  5. Daily security audits by third-party monitoring firm
  6. Automatic real-time data mirroring in two separate locations
  7. Regular incremental and full system data backups
  8. Off-site data backups in two separate secure physical locations