Live Webinar - Transform Onboarding

Reserve your spot

Live Webinar - Transform Onboarding

Reserve your spot

Manifest® Security Overview

Learn how Manifest® secures data with enterprise-grade hosting, encryption, access control, compliance testing, and device-aware security for regulated industries.

Enterprise-grade security for the most demanding operational environments

Manifest® was designed from the ground up to operate in highly regulated, security-sensitive industries where data protection, access control, and reliability are non-negotiable. This overview explains how Taqtile secures customer data across infrastructure, authentication, compliance, and devices, without slowing down frontline work.

Why Security Comes First at Taqtile

Security and privacy are foundational to how Manifest is built, deployed, and operated. Taqtile protects customer data through a combination of proven cloud infrastructure, rigorous testing, encryption at every layer, and strict access controls while supporting offline and constrained environments when needed

Built for organizations that require:

  • Audit-ready operations

  • Controlled user access and identity management

  • Secure deployment across cloud, government, or on-prem environments

  • Reliable performance even when connectivity or device features are restricted

.

Secure Hosting & Deployment Options

Manifest is deployed using enterprise-grade hosting environments designed to meet stringent security requirements.

Deployment options include:

  • Microsoft Azure – World-class data centers with physical security, access controls, redundancy, and secure network architecture

  • AWS GovCloud (US) – Used by U.S. government customers for regulated and sensitive workloads

  • On-Premise Deployment – For customers requiring full control within their own infrastructure

This flexibility allows Manifest to meet both commercial and government security standards without compromising functionality.

Compliance, Testing & Continuous Monitoring

Taqtile uses independent testing and automated security tools to continuously validate Manifest’s security posture.

Key measures include:

  • Third-party penetration and vulnerability testing

  • Automatic intrusion detection and prevention

  • Continuous code scanning before release to production

  • Ongoing progress toward SOC 2 compliance, covering security, availability, processing integrity, confidentiality, and privacy

Security is not a one-time checklist, it’s an ongoing process.

Privacy & Data Isolation

Customer privacy is treated as a core security requirement. When hosted by Taqtile, Manifest ensures that all customer data—including personally identifiable information (PII)—is isolated and protected.

Privacy safeguards include:

  • Dedicated cloud tenants per customer

  • Technical and organizational controls to protect sensitive data

  • No shared access between customers

Identity, Authentication & Access Control

Manifest provides layered access controls to ensure users only see and do what they’re authorized to do.

Security features include:

  • Two-factor authentication (2FA)

  • Azure Active Directory integration

  • Single Sign-On (SSO) via SAML and OpenID

  • Role-based permissions across all users

Roles range from IT Security Admin and Admin to Author, Operator, and Viewer, allowing precise control over system access, data visibility, and operational capabilities.

Centralized Security Management

Manifest includes a web-based central management application for configuring, enforcing, and monitoring security policies across the organization.

Administrators can:

  • Manage users and permissions

  • Monitor logs and tenant activity

  • Enforce password policies and access rules

  • Control operational domains and assets

Encryption at Every Layer

Data is encrypted both at rest and in transit to protect against unauthorized access.

Encryption highlights:

  • Full disk encryption for operating systems and data

  • Encrypted databases, files, photos, videos, and 3D assets

  • Secure key management using Azure Key Vault

  • HTTPS, SSL, SIP, and TLS (v1.2+) for all data transmission and remote assistance sessions

Backup, Redundancy & Reliability

Manifest automatically protects customer data through continuous backup and redundancy mechanisms.

Resilience features include:

  • Daily database backups with 7-day retention

  • Off-region redundancy options

  • Daily file backups with 30-day history

  • Protection for photos, videos, and 3D models

Device-Aware Security by Design

Manifest is designed to operate across a wide range of devices—from tablets and PCs to head-mounted displays—while respecting enterprise device restrictions.

Supports scenarios where:

  • Wi-Fi or network access is disabled (offline mode supported)

  • Bluetooth is disabled (core functionality remains intact)

  • Cameras are restricted (capture and remote assist limited, but operations continue)

This ensures Manifest remains usable even in locked-down environments.

Download the Full Security Overview

Get the complete technical breakdown of Manifest’s security architecture, controls, and deployment options.

Download the Security Overview (PDF) →

Talk to a Security Expert

Have specific security, compliance, or deployment requirements? Our team can walk through how Manifest fits your organization’s policies and infrastructure.

Talk to an Expert →

Taqtile