Enterprise-grade security for the most demanding operational environments
Manifest® was designed from the ground up to operate in highly regulated, security-sensitive industries where data protection, access control, and reliability are non-negotiable. This overview explains how Taqtile secures customer data across infrastructure, authentication, compliance, and devices, without slowing down frontline work.
Why Security Comes First at Taqtile
Security and privacy are foundational to how Manifest is built, deployed, and operated. Taqtile protects customer data through a combination of proven cloud infrastructure, rigorous testing, encryption at every layer, and strict access controls while supporting offline and constrained environments when needed
Built for organizations that require:
Audit-ready operations
Controlled user access and identity management
Secure deployment across cloud, government, or on-prem environments
Reliable performance even when connectivity or device features are restricted
.
Secure Hosting & Deployment Options
Manifest is deployed using enterprise-grade hosting environments designed to meet stringent security requirements.
Deployment options include:
Microsoft Azure – World-class data centers with physical security, access controls, redundancy, and secure network architecture
AWS GovCloud (US) – Used by U.S. government customers for regulated and sensitive workloads
On-Premise Deployment – For customers requiring full control within their own infrastructure
This flexibility allows Manifest to meet both commercial and government security standards without compromising functionality.
Compliance, Testing & Continuous Monitoring
Taqtile uses independent testing and automated security tools to continuously validate Manifest’s security posture.
Key measures include:
Third-party penetration and vulnerability testing
Automatic intrusion detection and prevention
Continuous code scanning before release to production
Ongoing progress toward SOC 2 compliance, covering security, availability, processing integrity, confidentiality, and privacy
Security is not a one-time checklist, it’s an ongoing process.
Privacy & Data Isolation
Customer privacy is treated as a core security requirement. When hosted by Taqtile, Manifest ensures that all customer data—including personally identifiable information (PII)—is isolated and protected.
Privacy safeguards include:
Dedicated cloud tenants per customer
Technical and organizational controls to protect sensitive data
No shared access between customers
Identity, Authentication & Access Control
Manifest provides layered access controls to ensure users only see and do what they’re authorized to do.
Security features include:
Two-factor authentication (2FA)
Azure Active Directory integration
Single Sign-On (SSO) via SAML and OpenID
Role-based permissions across all users
Roles range from IT Security Admin and Admin to Author, Operator, and Viewer, allowing precise control over system access, data visibility, and operational capabilities.
Centralized Security Management
Manifest includes a web-based central management application for configuring, enforcing, and monitoring security policies across the organization.
Administrators can:
Manage users and permissions
Monitor logs and tenant activity
Enforce password policies and access rules
Control operational domains and assets
Encryption at Every Layer
Data is encrypted both at rest and in transit to protect against unauthorized access.
Encryption highlights:
Full disk encryption for operating systems and data
Encrypted databases, files, photos, videos, and 3D assets
Secure key management using Azure Key Vault
HTTPS, SSL, SIP, and TLS (v1.2+) for all data transmission and remote assistance sessions
Backup, Redundancy & Reliability
Manifest automatically protects customer data through continuous backup and redundancy mechanisms.
Resilience features include:
Daily database backups with 7-day retention
Off-region redundancy options
Daily file backups with 30-day history
Protection for photos, videos, and 3D models
Device-Aware Security by Design
Manifest is designed to operate across a wide range of devices—from tablets and PCs to head-mounted displays—while respecting enterprise device restrictions.
Supports scenarios where:
Wi-Fi or network access is disabled (offline mode supported)
Bluetooth is disabled (core functionality remains intact)
Cameras are restricted (capture and remote assist limited, but operations continue)
This ensures Manifest remains usable even in locked-down environments.
Download the Full Security Overview
Get the complete technical breakdown of Manifest’s security architecture, controls, and deployment options.
Talk to a Security Expert
Have specific security, compliance, or deployment requirements? Our team can walk through how Manifest fits your organization’s policies and infrastructure.