TECHNOLOGY

Never worry about maintenance or downtime.

Our platform is designed by cybercrime investigators who understand the importance of securing your data against internal and external threats.

  1. HOSTING

    Kaseware is hosted on a number of cloud and private cloud platforms including Microsoft Azure and Amazon Web Services, the most secure cloud computing environments available. All our clients are extremely security-sensitive and we work with our partners to exceed all of our client’s requirements.

  2. HIGH AVAILABILITY

    Downtime is a thing of the past with Kaseware. Leveraging the cloud, your environment will be secure, available, and fully backed up.

  3. SCALABILITY

    Kaseware is built to scale. The Kaseware architecture uses cutting edge technologies that enable the system to deliver results at any scale. ArangoDB, our multi-model, NoSQL database, provides consolidated capabilities that outperform MongoDB, Neo4j, and PostgreSQL. Elasticsearch and Kibana, our industry leading search and data visualization components, provide proven performance for modern applications. Our RedHat Keycloak Identity and Access Management service provides scalable security with two-factor authentication, single sign on with your existing applications, user federation, and identity brokering. Every layer of the Kaseware architecture is containerized in Docker and designed to support high availability and horizontal scaling through clustering and load balancing.

  4. INTEGRATION

    Kaseware easily interfaces with existing systems. Kaseware provides a RESTful API and a lightweight JSON data exchange format that makes for easy connections with external interfaces.

  5. DATA MIGRATION

    We are able to migrate data, often easily and quickly. We will first need to review your current system and how you’d like it to appear in Kaseware. We’ve done a number of migrations with legacy systems, so if your system is on our list, the process may be as simple as the click of a button.

  6. DATA SECURITY

    All data in the Kaseware platform is encrypted using the latest encryption standards, both at rest and in transit. Kaseware regularly undergoes penetration testing to ensure that you’re protected against the latest threat vectors. The Kaseware access control model was designed using FBI best practices, providing a simple but powerful mechanism to restrict access to data based on content types, functional roles, and memberships, both broadly and granularly. We regularly leverage independent audits and are compliant with SOC 2 and CJIS. Read more about our compliance and certifications here.

  7. RESPONSIVE DESIGN

    The Kaseware web application is built to be responsive, meaning that it runs fast and looks great on everything from phone screens to 4k monitors, regardless of hardware or operating system.

  8. MOBILE & TABLET

    Kaseware provides dedicated Android and iOS applications to take full advantage of mobile capabilities on your phone or tablet.

  9. WORLD CLASS TECHNOLOGY PARTNERS