q. How does Impactia make sure that my email information is secure? is encrypted using SSL and authenticated by using a trusted certificate.
a. All of the communication between the user's workstation and the server's web client is encrypted using SSL and authenticated by using a trusted certificate.
q. What about secured transfer of emails using SSL/TLS?
a. Secured transfer of emails using SSL/TLS is not yet supported.
q. What kind of user authentication do you provide?
a. Authentication is applied in two layers:
Network: The network layer assures that only permitted partners can communicate with the system through predefined protocols. This layer is responsible for blocking out any non-permitted protocol or port request and is also in charge of the communication encryption.
Application: Every access to the system is authenticated and requires an approved username and password. The user layer authenticates system users, makes sure they act only according to their roll and audit their actions.
q. What about authorization?
a. This layer makes sure that only authorized personnel are able to perform a limited
set of actions based on their pre-given roll.
In addition, users are granted usage rights on a need-to basis.
Each user action is logged by the system and can be tracked. In addition, the application can be configured so that every change made by a user requires the approval of a top user.
q. Multi-tenant? Why should I share my data with others?
a. Every tenant is segmented so that its actions and configuration do not affect the other tenants while sharing the same system resources.
q. What about content control?
a. The Impactia solution enables administrating user parameters, permissions and passwords. By doing so, the Impactia administrator controls the views and action rights of each user. Only the top marketing user has the right to approve the publishing of a template content and prevent the publishing of inappropriate content and other forms of abuse.
q. What happens to email messages sent through Impactia?
a. The Impactia server secures the data stored by the system, making sure that sensitive data (i.e. email messages) is deleted at the end of each transaction, leaving only essential meta-data.
q. What kind of information is stored by the Impactia services?
a. The Impactia services store information for several aspects:
contact information (sender and recipient) is used for delivery rules and on email dynamic content
(such as signatures) detailed logging records system execution, and provides online event viewing
and monitoring of product performance.
Tracking actions made by each user, which can be evaluated and even reverted to if needed. Raw statistical data used in reports including graphs and charts, makes the data visible to all tiers of the organization.
q. Am I not risking my mails being treated as spam?
a. Not if you follow the instructions on our System FAQ page.