View all newsletters
Receive our newsletter – data, insights and analysis delivered to you
Myriad Technologies|3 April 2018

Secure Search and Information Exchange (S2IX)

Addressing the unique challenge of conducting missions, investigations and operations across challenging networks and dispersed locations, S2IX provides self-contained, connected, synchronising nodes.

Addressing the unique challenge of conducting missions, investigations and operations across challenging networks and dispersed locations, S2IX provides self-contained, connected, synchronising nodes.

S2IX allows governance, compliance, and policy adherence to function in the background for the end user, providing the ability to focus on day-today tasks. This structured collaboration is delivered through the tools and environments underpinning S2IX. It aligns EIM strategy by enabling the mapping of localised information to centralised EIM structures. This drives full information management lifecycle from cradle-to-grave.

Transparent categorisation of information during creation enables discoverability within an organisation’s EIM frameworks. Secure by design, S2IX uses claims-based security using clearance level, nationality, and caveats. Item level security goes further, with controlled access to content based on classification, caveats, and releasability.

Information follows individuals, granting them access anywhere, anytime, promoting agility. S2IX allows information exchange within and across organisational boundaries, retaining high levels of security isolation.

Myriad Technologies has a proven track record of developing and delivering award-winning solutions for military organisations.
NEWSLETTER Sign up Tick the boxes of the newsletters you would like to receive. The top stories of the day delivered to you every weekday. A weekly roundup of the latest news and analysis, sent every Friday. The defence industry's most comprehensive news and information delivered every month.
I consent to GlobalData UK Limited collecting my details provided via this form in accordance with the Privacy Policy
SUBSCRIBED

THANK YOU

Thank you for subscribing to Army Technology