Our Platform

Addressing the unique challenge of conducting missions, investigations and operations across challenging networks and dispersed locations, S2IX provides self-contained, connected, synchronising nodes. S2IX allows governance, compliance, and policy adherence to function in the background for the end user, providing the ability to focus on day-today tasks. This structured collaboration is delivered through the tools and environments underpinning S2IX.

S2IX aligns EIM strategy by enabling the mapping of localised information to centralised EIM structures. This drives full information management lifecycle from cradle-to-grave. Transparent categorisation of information during creation enables discoverability within an organisation’s EIM frameworks. Secure by design, S2IX uses claims-based security using clearance level, nationality, and caveats. Item level security goes further, with controlled access to content based on classification, caveats, and releasability. Information follows individuals, granting them access anywhere, anytime; promoting agility. S2IX allows information exchange within and across organisational boundaries, retaining high levels of security isolation.

Icon - Rapid Time to React.png

Rapid Time to React

Through automated deployment services, nodes can be rapidly configured and deployed. This reduces the time it takes an organisation to react to changing situations in the field, which enables the rapid deployment of field personnel.

Icon - Managed Activities.png

Managed Activities

With S2IX, a number of standardised structured collaboration areas are available in order to support business activities or business operations. These activities are derived from identified patterns within the organisation and quickly distributed as easy-to-use templates.

Icon - Secure Information.png

Secure Information

Secure by design, S2IX builds on SharePoint’s underlying security models, providing flexibility. Through the use of classifications, caveats, and releasability as well as delimiting markers, S2IX enhances item-level security. Through the concept of federation, security constructs are preserved across nodes, networks, and realms of trust.

Icon - Targeted Information.png
Icon - Just-In-Time Training.png
Icon - Deployable Cloudlets.png

Targeted Information

The S2IX solution utilises feature-rich dashboards that can be tailored to suit a number of key identifiers like role, topics, geo-tags, and business functions. Dashboards provide quick, easy, local access to current information, including documents, workflows and forms, ultimately supporting businesses activities around
the clock.


Just-In-Time Training

In rapidly changing environments, the need for swift personnel on-boarding is crucial. The self-contained training hub provides highly focused, easily consumed, training in order to deliver critical system information in a time sensitive environment.


Deployable Cloudlets

Built on a flexible modern architecture, S2IX nodes support a variety of deployment  patterns ranging from traditional on-premise to cloud-based configurations. This includes enhanced authentication mechanisms such as claims. Appliance-driven deployments allow business activities to occur beyond the edge of the network.