


Technology and Equipment Portfolio
Best-in-class technology for when you are out in the field
Dell Latitude 7230 Rugged Tablet

Tested for every condition
- Drop-tested from up to 4 feet.
- Temperatures up to 63°C/145°F are no sweat.
- Works in -29ºC/-20ºF weather.
- IP-65 rated for maximum protection against dust, dirt, and water ingress.
Axon 3 Bodycam

Key Features
- Multi-Mic audio.
- Ironclad Security.
- Reduced Motion Blur.
CJIS Level 4 Security Awareness
Our engineers have attained Criminal Justice Information Services (CJIS) Level 4 Security Awareness Certification.
The purpose of this certification is to make all users with authorized access to Criminal Justice systems and data-aware of their individual responsibilities and expected behavior.
Security Awareness Training Level 4 is designed for all information technology personnel including system administrators, network administrators, etc.

Managed Backup and Disaster Recovery
Cloud-Based Disaster Recovery offers many advantages over traditional methods.
Local Backup
We backup your systems and data to a local backup device using either your existing backup software or our software.
Duplication and redundancy are removed from your backup data, compressed, if enabled encrypted, and stored on your local backup device.
Cloud Backup
Your backup is replicated to our cloud where it is compressed; duplication and redundancy are removed; and is encrypted if enabled; all before being transmitted to our secure facility.
Disaster Recovery
When you declare a disaster, we recover your most critical systems from your cloud backup and provide access for your users. Your backup service is fully tested annually to ensure that you can recover when you need to.
Cyber Recovery Services
Dell Cyber Recovery – Market-leading protection against Ransomware attacks

Isolation
Physical and logical separation of data within an air-gapped vault.

Immutability
Preserve data integrity and confidentiality with layers of security and controls.

Intelligence
Machine learning and analytics help ensure recoverability.
How PowerProtect Cyber Recover Works
- Critical data is synced to a hardened vault and isolated with an automated operational air gap.
- A copy of this data is made and vault retention period is set as needed.
- The data is retention locked to further protect it from accidental or intentional deletion.
- CyberSense performs full content indexing of all vaulted data confirming integrity and alerting to any potential corruption.
- Recovery of data from the vault is efficient and secure whether for testing or incident response.
