Many of our engineering customers, when comparing products such as ours, concentrate on features and performance. What organizations often overlook is the need to go beyond the technical features when determining requirements of a product and consider additional risk factors.
Companies need to find out that the product they are planning to purchase:
- Doesn’t have embedded code that infringes upon a patent or copyright
- Doesn’t contain a Trojan horse
- Has been tested and examined for embedded viruses or time bombs
- Contains certified-safe third-party code if it embeds any external libraries or open source code
We understand these concerns because we provide products and services to a great number of high profile, security conscious organizations in the financial services, insurance, document management, and health records arenas. These companies are entrusted with highly confidential information that must be stored and processed securely. They also typically serve thousands, if not millions, of people who are dependent upon their information being reliably accessible as well as private.
When these companies embed imaging technology into their products in order to view and manipulate documents and images, they need to have absolute confidence that their applications and data will remain safe. Unlike many others, we can verify the safety and security and ownership of all the code within our products. We perform our development within the confines of our own offices in order to assure that security. To many of our customers, this assurance is as important as the features and power of our imaging solutions.
-Simon
Recent Comments