Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

excel fostering

The Request

All businesses have sensitive or confidential data, but some have requirements that go beyond the standard for data security, a fostering company is a prime example of one such business.

AGT were approached to develop a solution where data could be locked down, accessed only by specific users and where documents were only available to be viewed for a certain period of time.

The Analysis

Discussions with the business highlighted the level of importance of the data security, and that just a password protected document or device would be insufficient in order to maintain the confidentiality of the data. Regardless of the level of security required, Wi-Fi capability would still be needed on the device.

The Solution

Various types of software were tried and tested with the strengths and weaknesses of each one evaluated as to its suitability towards the requirements. The software must not only be able to password protect documents and data, but also the ability to print had to be removed and an expiry time or date needed to be applied too. Meaning the data would become inaccessible once certain criteria had been met, for example once it had been viewed or once it had reached a specific date or time.

Utilising multi-layered authentication we were able to achieve the level of security the business needed, meaning if the tablet was lost or stolen no data could be accessed and an additional failsafe allowed the tablet to be wiped remotely if there was any doubt it could be compromised.

Once the software was found that met all the required criteria, it was then loaded onto a tablet, configured for testing and presented to the customer to ensure it fulfilled their requirements.

The Outcome

With the authentication in place, the applications were locked down and the tablet and SD card were encrypted – meaning if someone even tried to hack the tablet using an SD card it would become encrypted and therefore be rendered useless.

Several tablets were loaded and configured with the necessary security requirements and enabled for Wi-Fi access, proving to carry out exactly what was needed. These tablets are now being used throughout the business.

Arrange a FREE IT Audit

Get in touch to start improving your IT systems & productivity with AGT today

Contact Us

Our Blog

5 Ways AI is Supercharging Your Office: From Productivity Powerhouse to Creative Concierge

AGT - 5 Ways AI is Supercharging Your Office: From Productivity Powerhouse to Creative Concierge

The importance of speedy broadband for your business

AGT - The importance of speedy broadband for your business

Qlocker security threat targets random businesses

AGT - Qlocker security threat targets random businesses

Computer support investment worth £1.2bn at Met Office

AGT - Computer support investment worth £1.2bn at Met Office