SaaS is Service with Kern EDGE
From complete document management services offsite to on-going customer support and training, Kern EDGE can produce an immediate Return-On-Investment and reduction in Total-Cost-of-Operation for your company. Think of EDGE services as a way to cut cost and grow your business without new capital.
Kern EDGE automates your document flow, giving you access to any document, instantly. You can set any legal, financial, or any other document to alert you when it is due.
Kern EDGE provides economical services to companies that neither need nor want to pay for custom Data Management systems maintained by large enterprises.
Document Scanning Services
Kern EDGE is more that just Cloud services. Kern offers complete document scanning and indexing services at our office or yours.
In any electronic document output management solution, efficiency in managing the input is a critical step.
For legacy, paper-based applications, that means physically scanning the documents into electronic form and applying the right indexes to them to make them support the business process. Kern EDGE is a complete solution tailored to your business application.
We offer the services to handle your physical documents and usher them across the gateway to the electronic world. We can arrange for pick-up at your site and delivery to one of our regional production sites for processing or we can complete all necessary tasks at your site. All scanning and indexing services are completed promptly with a focus on accuracy, giving you a clear path to supporting your business applications.
Professional, confidential, and secure document scanning services from a trusted document management company. Call 614-317-2600 for a scanning quote.
SaaS - Software in the Cloud
There's a lot of buzz today about "the Cloud". At Kern, we like the term because it’s a simple reference to that big network in the sky without dishing out arcane acronyms describing services delivered over the internet.
We think of looking at all of those systems diagrams that show their connections to a wide area network or the internet drawn as a cloud and suppose that is the origin of the term. Since many in our industry are using the term "SaaS", or Software as a Service, we’ll refer to that as well.
A SaaS or Cloud service has several characteristics that make it different than hosted applications. Hosted applications require that the user buys the computing platform, the operating system for that platform, and the needed systems tools and application software to complete the solution. All of these components need to be purchased or leased with implications to capital expenditure planning.
The user’s IT organization needs to be ready to support the installation and maintenance of the hosted application and the platform selection needs to conform to their standards for consistency and supportability. Cloud services, on the other hand are as described; services. As technology has enabled faster, better and cheaper internet connections, compute platforms, storage and security, these functions can be centralized to a specialist.
All of the components we mentioned before can be optimized and access to the application can be essentially rented as a service. Of course, rental means that the costs are now operating expenses. Cloud services can be public or private, meaning that the user can select the option of having their application share the use of a server or have their own dedicated private server.
The preference is really up to the user as even public cloud services can be configured to load balance across multiple servers to maintain performance and the access to the data is secured to ensure that only those with permission rights to access the application.
Data Center
Kern EDGE applications are hosted in a world-class, Tier IV data center that has received multiple awards for its innovations and energy efficiency.
Tier IV is the most stringent and elevated level in the Telecommunications Industry Association’s (TIA) data center standards rating system, the industry’s most trusted rating. A tier IV data center must be capable of delivering 99.995% availability with an annual downtime that never exceeds 24 minutes.
This means that there are multiple redundant systems for power, cooling, and back-up servers. In addition, Kern EDGE is accessed over high-speed business class internet services from carrier neutral fiber connections to Tier1 providers.
Document Security
Superior security begins with Kern EDGE’s innovative software platform that handles files through proprietary technology that makes your files accessible and viewable to only those with the required access credentials. All documents, once scanned and indexed, are run through our security encryption software where they are “wrapped” in a secure format and immediately uploaded to the Customer’s secure “Private Cloud”.
How we keep your documents secure
We provide multi-layer security for critical documents when they are at rest. Every document is 128 bit encrypted using AES level encryption and password protected. Those password protected and 128 bit encrypted documents are then encoded into the secured WRA-structured file, which provides an additional level of security to protect them.
In the Kern EDGE SaaS platform, the customer is able to maintain and manages the security user filters and can control who can access the data with user name and password administration. This encryption insures that internal network/system personnel cannot view the data even if they can access the drive and/or directory where the data is stored on your internal server. No user has any access to any WRA file directly. The software is the only source that can extract the document from this archive and returns only the single requested extracted document.
Extracted documents in transit are sent via SSL 3.x (TLS) encryption over HTTPS, the highest level of security currently available on the internet. A valid certificate signed by a certified signing authority is provided to each and every hosted customer that provides this level of encryption.
3 Step Encryption Process
- Scanned or uploaded images are 128 bit encrypted
- Encrypted files are converted to .WRA format for secure storage
- Files are password protected and only accessible by authorized users with valid login credentials and transmitted through HTTPS