Overview

Whether you are a media publisher, content owner, a business enterprise, a government department, or an educational institute; content security is of utmost importance and a key challenge. VIDIZMO accepted the challenge and designed its content and evidence management systems to be highly secure in order to meet the security requirements of all of its users 


Understanding Content Segregation

VIDIZMO's multitenant architecture allows the users to segregate content into multiple departments for better organization and enhanced searchability. This segregation of the content is done by creating portals.

Following is a description of how VIDIZMO organizes and segregates user content.


Portal 

Portals provide highest level of segregation between different organizational departments and units by providing them with complete autonomy over the content and the users who will be accessing the content within a portal. Additional portals can be setup as well inside the same instance of VIDIZMO. Multiple portals helps in keeping the evidences in a private and secure environment where only authorized users have access. With customizable security policies, only specific users can access the portal. One can even limit the portal to authorized users only.


For more details about portals, check out the article: Understanding VIDIZMO Account & Portal.


Folder

Large-scale enterprises contain a collection of video content that needs to be distributed into folders for better organization of the content. To solve this problem, VIDIZMO allows its customers to create distinct folders and sub-folders within a portal for content to be maintained and searched easily.


Subfolders 

Subfolder plays a significant role in classifying the content into a more granular form. Users can easily search and sort the content in Subfolders. For more details, check out the article: How to Manage Folders


Case 

A case is basically a collection of evidence files such as documents, videos, and audio files. Evidence can be logically grouped together into Cases and can be managed in following ways.

  • You can add one or more evidences to a case
  • An evidence can either be a separate piece of evidence in a folder or be part of one/more cases
  • An evidence and a case are distinct entities that are managed separately in the application such that a user can have access to Case A which contains Evidence A, but not have access to an individual Evidence A. This entails that they can only access Evidence A in context of Case A and not otherwise
  • A Case has its own lifecycle in VIDIZMO such that a case status does not affect the status of the individual evidence within:
  • A case is deleted/purged, its evidence(s) remain unaffected
  • A case is drafted, its evidence(s) remain unaffected
  • A case is flagged, its evidence(s) remain unflagged


An evidence and a case are distinct entities that are managed separately in the application such that a user can have access to Case A which contains Evidence A, but not have access to an individual Evidence A


Accessing Evidence

To provide users with the ability to effectively manage and control the content on their respective portals; it is necessary that they have the right to define access permissions according to their need.


For flexibility and easy management of user permissions, VIDIZMO allows setting up these permissions at two levels:


Portal

Applying security policies on a portal will allow the customer to define governance controls that determine who can access the portal and view evidence within it. In VIDIZMO, Security Policies can be configured according to your use-case. These security policies can be:

  • Public
  • Internal
  • Restricted
  • Hidden
  • Custom

The 'view' access on evidence within a portal can be implemented based on these security policy types. To read more about security policies, see: Understanding Portal's Security Policy : VIDIZMO Helpdesk



Note: Public/Anonymous Access is not applicable for Digital Evidence Management Product


Multitenancy/ Portal Separation 

VIDIZMO manages its content and user synchronization at portal Level independently through its 'user role/group permission' assignments. These VIDIZMO portals can be mapped on multiple departments separately. Granting them complete autonomy, while maintaining complete privacy and independence to each organizational unit. 


VIDZMO’s multi-tenancy allows complete segregation of content and users within Portals, unlimited folders, cases, evidence, users/groups, and roles. It further enhances customization to fit varying business needs. Implicitly each Portal has its own Managers, Moderators, and Contributors to manage its content and users independently.


Each portal can connect to its own user authentication sources such as Active Directory, organizational database, social media login, forms-based authentication etc. VIDIZMO AD Connector pre-positions the users within VIDIZMO software and maps users/groups with specific portals. To achieve business goals, unlike its competitors, VIDIZMO doesn’t require multiple licenses of their product where each product will require separate installation, management, and control.


Case / Evidence 

Authorized users will be able to select who can view each case and/or evidence individually by utilizing settings available for each evidence. In VIDIZMO, the Access tab in the settings of each evidence, manages the availability and accessibility of the media such as who can access the media.


All account and portal viewers 

Enabling this allows all registered users of portal and the parent-portal (Account) to view and access this media


All portal viewers

Enabling this allows all registered users of the portal only to access the media


Anonymous viewers

Enabling this allows all viewers (whether registered or anonymous) to access the media


Specific viewers and groups

This option allows the uploader to select specific viewers and groups only for whom the media will be accessible


Password

The uploader can also apply an additional password on specific evidence for the access and playback of the evidence. This requires the viewer to know the password and the media will only play once the viewer has entered the valid password


For a more detailed insight into what each of these user roles are permitted or have access to, please refer to Understanding Roles and Permissions in DEM.


Under this heading, you need to add related articles to this topic in a bulleted list below such as here are a few sample concept documents: