+ All Categories
Home > Documents > Scout Overview

Scout Overview

Date post: 21-Jul-2015
Category:
Upload: jlankes
View: 224 times
Download: 0 times
Share this document with a friend
Popular Tags:
14
Thank you for your interest in Scout Leading organizations are leveraging browser-based solutions to improve productivity, capture more accurate information, and create a collaborative work environment for investigations. Scout is a central repository and communication hub for investigations. The application creates visibility that drives better management, reporting, lowers loss costs and improves productivity. Role-based permissions allow for unlimited variations of user types. Quicker Architecture of the end Solution Taking advantage our industry experience means that the solution you’re leveraging has already been planned for, designed, implemented, deployed and tested. Better Support While using Scout, your company is leveraging an application that comes from, is managed by, and is supported by experts who focus only on the system 24/7. There is an entire team behind the application. Phone Support: (248) 577-0994 – Regular business hours are: 9am–6pm EST, Monday through Friday. A live answering service is available 24 hrs/day for emergency requests. 24 hr. Email / Ticket Support System: [email protected] Less reliance on the IT Department Since you’re pointing a browser to our hosted platform, the only infrastructure you’ll need is a computer and access to the internet. This means you don’t have to provision for hosting, managing, and supporting your own internal infrastructure. Scout is an effective way to quickly ramp up your new business solution while minimizing your IT footprint. Quick Configuration Administrative controls allow the application to be set up based on departments, regions, and divisions within you company. Data capture, roles, work, and assignment types may also be easily configured. Simple Implementation Our team will work with your organization on system requirements, set-up, and delivery of Scout to its environment. Firewalls, passwords, intranet, and other internal system requirements will be taken into consideration. In-depth Training We are committed to helping our clients realize maximum benefits from their investment by offering extensive training. We provide customized training either online or on-site. Rather than providing the typical trouble shooting assistance for our clients, our team will give extensive tutorials and answer questions about how to use particular commands in Scout.
Transcript

Thank you for your interest in Scout

Leading organizations are leveraging browser-based solutions to improve productivity, capture more accurate information, and create a collaborative work environment for investigations.

Scout is a central repository and communication hub for investigations. The application creates visibility that drives better management, reporting, lowers loss costs and improves productivity. Role-based permissions allow for unlimited variations of user types.

Quicker Architecture of the end Solution

Taking advantage our industry experience means that the solution you’re leveraging has already been planned for, designed, implemented, deployed and tested.

Better Support

While using Scout, your company is leveraging an application that comes from, is managed by, and is supported by experts who focus only on the system 24/7. There is an entire team behind the application.

Phone Support: (248) 577-0994 – Regular business hours are: 9am–6pm EST, Monday through Friday. A live answering service is available 24 hrs/day for emergency requests.

24 hr. Email / Ticket Support System: [email protected]

Less reliance on the IT Department

Since you’re pointing a browser to our hosted platform, the only infrastructure you’ll need is a computer and access to the internet. This means you don’t have to provision for hosting, managing, and supporting your own internal infrastructure. Scout is an effective way to quickly ramp up your new business solution while minimizing your IT footprint.

Quick Configuration

Administrative controls allow the application to be set up based on departments, regions, and divisions within you company. Data capture, roles, work, and assignment types may also be easily configured.

Simple Implementation

Our team will work with your organization on system requirements, set-up, and delivery of Scout to its environment. Firewalls, passwords, intranet, and other internal system requirements will be taken into consideration.

In-depth Training

We are committed to helping our clients realize maximum benefits from their investment by offering extensive training. We provide customized training either online or on-site. Rather than providing the typical trouble shooting assistance for our clients, our team will give extensive tutorials and answer questions about how to use particular commands in Scout.

Extensive Integration

Scout web-services can be created to integrate with Claims, File Storage, and other in-house applications. Transferring data from almost any system to Scout can be made seamless. Integration with Scout Vendor Management Platform is not only possible, but encouraged.

Easy Data Migration

Data from existing systems can be transferred into Scout through a variety of formats including .csv, Excel, Jason, Access, and others.

Hosting and Support

Virtual Advantage has a completely autonomous environment for Scout. The hosting environment utilizes multiple systems to ensure the performance and reliability of the network. The application and database resides on a redundant server, offering back-up hard drives and power supplies.

Security

Scout uses a high-grade 256-bit SSL (Secure Socket Layer) connection to encrypt the signal between Subscriber’s computers and the Scout servers so data transmitted is secure.

Server Infrastructure

The server’s redundant hardware configuration allows continuous running even in the event of a hard drive or power supply failure. The server operating system and database will be continually monitored for uptime and function, ensuring the systems reliability. All security patches and updates for the host operating system will be applied by administrators in the first maintenance window after their release. Database transaction and security logs will be audited regularly to ensure proper application performance. Database defragmentation is performed regularly during scheduled maintenance periods to ensure the system performs quickly, even under maximum user load.

Hosting Environment

Virtual Advantage’s hosting partner has a tier one datacenter with features that include the latest VESDA smoke detection and FE-25 clean fire suppression systems. Biometric and employee specific pass codes for all security checkpoints ensure that no unauthorized personnel are allowed access to the data center floor. Steel reinforced doors, frames, and safety glass, fortify the building against vandals or robbery. The entire facility is covered by video surveillance, which is monitored by a remote station to ensure video security.

The datacenter also has multiple networks and providers for bandwidth redundancy and scaling. They have a dedicated transformer set from the local power company, redundant power and cooling systems, and several diesel generators that are tested monthly.

SoftLayer Data Center and Network Information:

http://http.cdnlayer.com/softlayerweb/PS_Network.pdf

http://http.cdnlayer.com/softlayerweb/PS_DataCenterOverview.pdf

Maintenance

In addition to the robust server and hosting infrastructure, Virtual Advantage performs a number of procedures to ensure the application performs as efficiently as possible.

• Health Check – A quick run through of the application, testing each of the core functions

• DB folder archive – Database backup files are copied to a secondary archive drive for temporary storage

• Email testing – A test of the system’s email functionality

• Memory/processor utilization check – Tested to make certain the application is running with enough available processor performance and memory to perform as expected

• System/security/application log – Are audited for errors that can indicate future problems

• Server cleanup - Cache files, temporary files, Access logs, Web server logs, and database logs are removed from the server

• Patch installations & server re-starts - Performed as needed, or as patches are released from Microsoft. Normally once a month, critical patches are applied during the next maintenance window. Regularly scheduled maintenance windows are Sundays 12am – 4am

• 24/7 monitoring

Overview

User Management

Create Users and User Groups with permission-based system access

Permissions

Control user access to information and functionality

Case Entry/ Summary

Data capture can be customized based on required referral information

News Feed

Keep up to date on recent activity

Case Load Summary

Organize, sort, and filter case work. Each user can select the columns they want to see.

Calendar

Month/Week/Daily view of tasks, events, and personal reminders

Assignments

Overview of who’s working on what. Each user will have the ability to select columns

Reporting

Build an almost infinite number of ad-hoch reports based on any data captured in Scout

Case Details

Gather information in a configurable form. Add parties, property, incident details, loss decriptions and more.

Case History

A chronology of case happenings

Team

Build the team working on the case. Make assignments to internal staff or grant external parties controlled access to the case.

Actions

Assign Tasks, Create Events, and set Personal Reminders for each case. Displayed on the Calendar.

Case Notes

Build solid cases and review communications with organized notes and reports

Files

Store and review documents, photos, video, and audio files in each case.


Recommended