G Products Summary

      Comments Off on G Products Summary

Data Validation While all Livescan Systems are certified for NIST record creation and editing, G2Solutions offers data integrity checking, and customized validation of field data that won’t always be strictly described in the EFTS. This is especially crucial where two or more fields’ data is interrelated and calls for cross checking to make sure consistency of the values awarded. With data errors accounting for a huge variety of rejected data, G2Solutions is committed to offering every feasible process of decreasing this number, thereby saving candidates, submitters and businesses bandwidth, time, and money. Records found to comprise inaccurate data generate an alert that’s then sent instantly to the submitter for correction. This email typically can be sent within 30 seconds of a record being obtained, permitting the submitter to accurate and re submit the record while the Applicant continues to be existing.

Record Forwarding After being got and proven, record data is examined to decide, based upon purchaser described rules, where the transaction is to be routed. For submitters who are looking to catch information for a variety of of Controlling Agencies, this characteristic lets them have statistics sent to businesses comparable to the California Department of Justice DOJ via the Private Applicant Network PAN, the California Bureau of Security and Investigative Services BSIS via Internet Virtual Private Network VPN, the Federal Bureau of Investigations FBI via the Integrated Automated Fingerprint Identification System IAFIS, the American Banking Association ABA, the New York Clearing House, and the National Airline Transportation Association NATA simply to name a few. Record data akin to Type of Transaction TOT, 1. 04, Originating Agency Identifier ORI, 1. 08, Destination Agency Identifier DAI, 1. 07, Controlling Agency Identifier CRI, 2.

073, and another tag field inside the record can function standards for routing rules. Using this strategy, it is possible for a Private Patrol Operator in the State of California to send Security Guard Applicant Fingerprint checks to the BSIS via the Internet VPN, and all other applicant fingerprints directly to DOJ via the Private Applicant Network immediately, based upon the California EFTS Type of Application 2. 400 tag field set. The following diagram illustrates this work flow: Web based Data Collection and Scheduling Service As an option to the simple transaction routing carrier, G2Solutions also offers customers and their customers the comfort of online data entry and appointment scheduling. Applicants may, at their option, create an account with G2Solutions that stores all of their employment suggestions. This advice is then used when the Applicant must schedule an appointment to have fingerprints taken, selecting a date and time, and adding the form of application, and service provider information.

See also  CAWIC About

On the date of the appointment, the record is distributed to the LiveScan scheduled for catch, and when the applicant arrives only the fingerprints themselves need to be taken. Web based Management and Financial Reporting Web based reporting is an optional tool attainable exclusively to submitters for the goal of monitoring throughput, averages, trends, and cross checking fees accumulated. Utilizing an Ad Hoc interface, very inventive summary and detail reports may be produced, from total transactions and charges gathered for a given quarter, to the usual per 30 days number of Armed Security Guards fingerprinted during the past one year. These reviews can be viewed online, or saved to Adobe PDF for garage, printing, emailing, and later retrieval. Submitters pay a nominal extra fee per transaction for this optional service. Server Firewall and Anti Virus Protection G2Solutions employs multiple servers for receiving, processing, and forwarding transactions.

The Web and Email Server is the best direct link to the Internet, and is then internally firewalled and attached to a personal Demilitarized Zone DMZ Network. Using Linux and IPTables, access during the firewall is exactly controlled by port and IP tackle. While all transactions bought will come from the Internet via Secure SMTP, only those transactions destined for submissions services obtainable via the Internet, similar to the California BSIS, could be processed by this server. Transactions destined for the California DOJ PAN, as an example of a Private Submissions Network, may be processed by a dedicated server connected to the DMZ community internally and externally via frame relay leased line to DOJ. By isolating this server, and eliminating any direct link to the Internet, it is possible with IPTables to make sure zero percent packet propagation from the Internet to the DOJ PAN, and vice versa, while at an identical time minimizing community latency.

See also  What’s the Future of Advertising? – Digital Ad Agency

As an added degree, unfortunately necessary in these times, G2Solutions also employees a very sophisticated Automated Lightweight Intrusion Detection System ALIDS. This system continually displays endeavor on all community interfaces for suspicious site visitors and generates email, Cellular SMS, and/or pager alerts straight upon detection of an intrusion effort. Working in concert with the IPTables firewall, the ALIDS System will immediately block all access from any IP address suspected of launching an attack, gather all available suggestions about the source, and ahead this advice to a couple of Federal Agencies, adding the United States Computer Emergency Response Team situated at Carnegie Mellon University. Once done, this IP address will remain blocked for 90 days, or until manually removed by one of our Network Administrators. As an added degree of security, if an attack exceeds a predetermined threshold of source IP’s, equivalent to on the subject of a Distributed Denial of Service DDoS attack, the Internet attached Server will isolate itself from the DMZ inner most network by downing and disabling the inner interface, thus ensuring the integrity of techniques, networks, and data to which G2Solutions has access.