REVISION developed the concept for “The Office Smart Client” within a universal DOD secured Intel-Based system, which supported legacy applications. The Smart Client system maintained all user storage on a server back-end solution. The server back-end solution was a significant concern because of the potential inability to locate vital data and data vulnerability issues linked to access. The Smart Client, image security system, was built around the DOD Common Access Card (CAC) authentication and utilized Citrix (passed CAC permissions from the OS as Single Sign-On [SSO]) to access Windows-only programs.
The diversity of this solution required REVISION to research and evaluate new technologies and introduce new systems to meet mission requirements, pushing vendors to develop new ways of using these devices and programs. The vendors involved were Apple, Citrix, Admit MAC, VPN, PKI/CAC, AKO (Army Knowledge Online), Microsoft (MAC), and many other software developers. REVISION completed the analysis through site surveys and equipment evaluations and provided recommendations to the client. reVision researched and evaluated a wide range of devices and security technologies, including, but not limited to, firewalls, routers, and Public Key Infrastructure (PKI) initiatives. REVISION worked with the customer to develop and deploy security suites and equipment to include an anti-virus solution suite that addressed the disinfection of virus/worms and the detection and removal of adware/spyware. By doing so, REVISION ultimately ensured data confidentiality, integrity, and availability.
REVISION’s experience implementing technology upgrades in healthcare through research and testing has allowed the customer to receive application integration efficiencies and improvements previously thought unavailable for Internet Explorer and Outlook running natively. reVision has been able to work with developers and engineers to adjust coding and remove integration conflicts that allowed for multi-level CAC integration, sending and receiving of signed and encrypted e-mails, access to CAC-enabled websites, and digital signatures on documents.