Prevent Unauthorized Access to Protect Evidence Integrity
It is important to make sure evidence is only accessible by an authorized user. VIDIZMO DEMS allows you to configure several security features to control access and activity for each user for evidence security based on the needs and requirements of the agency.
VIDIZMO is recognized as a Major Player in the 2020 IDC MarketScape
Minimize Cybersecurity Risk with Evidence Access Control
With the frequency and severity of cybercrime on the rise, protect criminal data and other sensitive information from unauthorized access with VIDIZMO DEMS robust authentication and authorization process to ensure the highest level of security.
Access Control Capabilities
Role-Based Access Control
Assign a specific role to each user to control their access and permissions to perform various functions. User roles include IT Administrator, Chief/Deputy Chief, Investigator, Editor & Viewer.
User Management
Determine the access level and permissions and manage user roles to control access to evidence and cases in VIDIZMO DEMS portal.
Group Management
Determine the access level and permissions and manage groups to control access to evidence and cases in VIDIZMO DEMS portal.
End-to-End Encryption
Authenticate user access using FIPS compliant encryption. Encrypted evidence is decrypted and accessible to authorized users only after they have been authenticated upon the request of viewing or accessing the evidence.
Password Protection
Add another layer of protection to more sensitive evidence by adding a password for heightened security.
Location & IP Restriction
Restrict or enable specific or regional IP addresses from accessing the system.
Login Timeout
Set a time frame for inactivity after which a user is automatically logged out.