Aware Solutions for the Public Sector

Spotlight

On-Demand, aggregated insights on behaviors like sentiment and activity across the entire organization, groups, topics and more.

Signal

Continuous analysis of content based on a configurable, AI powered policy engine that allows for immediate alerting, review, and automated actions of contextual events.

Search & Discover

Historical retrieval of content and context based on user, keyword, channel, People Set or DM conversation with the ability to view, filter and export conversation content. 

Data Hold

Ability to contextually hold content in the Aware Data Platform from being removed by a Retention Policy based on author, Signal Rule or People Set.

Retention

Create automatic data retention policies that allow for a systematic approach to removing data from the Collaboration Platform and/or the Aware Data Platform.

User Data Removal

Dynamically remove data from the Collaboration Platform and the Aware Data Platform for a specific user/author.

 Platform Default Capabilities also include Foundational AwareIQ models, Sentiment NLP, Toxic Speech NLP, Info Quality NLP, Theme Extraction, Image: NSFW, Image: Software Screenshot, Language Detection NLP, Behavior Indicator, Role Based Access, Audit Logs, Customer Managed Encryption, Up to 20 Aware Users, Custom Email Sender Domain and SOC2 and ISO Certification.

 

Add-On Capabilities

  • Generative AI. AwareIQ Generative Summaries in Spotlight, Signal and any other future applications.
  • Image OCR Analyzer. Extract text off images (like Screenshots and other digitally rendered images) to be evaluated and indexed.
  • Bot Content Analyzer. Ingest, analyze and index content created by content platform system or third-party bots.
  • Customer Managed Keys. Allows customers to manage their own encryption keys from a third-party system like Azure Key Vault or AWS.
  • People Set Labels. Allows customer to add directory or other people attribute labels (location, department, etc.) to data ingested by Aware to be leveraged by Apps across the platform.
  • File Content Analyzer. Ingest, analyze and index files that get upload with messages from content platforms.
  • Data Assess Sets. Allow granular Data Access Sets for specific roles in Aware.
  • URL Classification. Allow for URL classifications as a condition trigger in Signal Rules for phishing and link reputation tracking.
  • Full Context API Access. Gives customers full access to Aware’s developer APIs – allowing them to build extensible workflows to and from Aware.
  • RiskIQ Package.  Includes Risk NLP classifiers (Password, Sensitive Data, Code Detection, File Names, Language, Tombstone/Delete Action
  • Aware User Expansion. Allow for expansion to future business units but controlling how many Aware users are part of the license.

 

Privacy Capabilities

  • Data Access Sets Allow granular Data Access for analysis in Aware. Example: Only allow analysis from this specific Workspace Public Channel.
  • Role-Based Access. Create and assign specific users to specific Roles allowing full control of the application capability and data access a user has in Aware. Example: Grant a access to Spotlight with view only permissions, ensuring they only have access to aggregated and anonymized reporting.
  • Reporting and Rule Alerts by People Sets. Within the applications, users can include/exclude certain data by People Sets. This acts as another layer to ensure analysis is only done on the appropriate data set for the business use-case. Example: A user wants to set up an alerting rule but they want to exclude analyzing content from certain users from a certain region
  • Username Obfuscation. Anonymized usernames by default in context views where content is surfaced. Example: A user just cares about the content being shared and the employee posting it is not relevant to the use-case
  • Audit Logs. Users activity in Aware is audited and accessible by an Aware admin via Settings or Aware’s API Example: A system admin wants visibility into the behavior of Aware users and what capability they are accessing and when
  • Data Retention. Customers have full control over their data retention in Aware by setting up retention policies in the interface. These can be tailored by Source, Workspace or Channel
  • Encryption Control. Aware gives customers full control over their encryption and connection with Slack Tenant content is stored using our encryption system which support BYoK. All metadata, configuration, and Aware generated content is stored using disk level encryption.

​​​​