uSecure

An Industry-Leading Data Protection Solution

Our uSecure module offers the most secure data protection available on the market today! This data security software allows your print and mailing business to easily protect clients’ private information, from credit card data to medical documents.

Data Protected Even if Files are Copied or Stolen

uSecure is the only product on the market that can process data without first removing the protection. uSecure allows the data owner to set the rules governing their data. These rules are then embedded within the data and control every aspect of how the data can be used, when it can be accessed, and by what applications. uSecure is the leading data protection solution for any corporation that processes critical data such as HIPAA and PCI.

This data protection solution works seamlessly with our payment processing, customer communication, and other software modules to keep your entire production process simple, secure, and efficient.

Critical Data Security - Keep Your Business & Customers Protected

uSecure is focused on data integrity, privacy, and unmatched security. Give your customers confidence in the security of their information!

uSecure assists organizations in meeting data protection requirements for safeguarding intellectual property, financial data, and all other sensitive information.

Protecting Businesses Across America

Uluro's uSecure protects companies and businesses across America. We work with partners in nearly every major city including Atlanta, GA, Charlotte, NC, Chicago, IL, Chattanooga, TN, Cincinnati, OH, Indianapolis, IN, Jacksonville, FL, Nashville, TN, Louisville, KY, Memphis, TN, New York, NY, and more! 

Contact Uluro’s data security sales representatives to learn more about uSecure – SmartData and learn how it will keep your clients’ files protected today.

Explore the features of Uluro’s uSecure – SmartData below:

uTrack provides organizations with the ability to take any number of available files and combine them into a single production run, all on demand. Uluro provides the flexibility and capability to achieve production efficiency levels once thought unreachable in the document production process. This efficiency allows for longer production runs, reduced setup times and increased throughput per hour to make the lowest obtainable cost per unit.

Uluro’s dashboard provides informational access to any user with rights for each job and the mail pieces within the job through a Windows-based interface. Clients can track their jobs daily, from file receipt and proofing to production and final delivery to the USPS.

With full mobile and tablet support, the dashboard ensures your sales and customer service staff won’t cause constant production interruptions. An alert feature enables messages to pass through the dashboard regarding status changes and additional job information.

Uluro allows for the automated creation of a user-defined “job ticket” upon the completion of a client data transmission. This job ticket is the initial document used to trigger the physical production process and follows the job through the entire production process.

Advantages to Job Tickets:

  • Custom design a job ticket to contain all relevant information for document processing to help reduce mistakes and increase productivity.
  • Job tickets print automatically on a user-defined printer upon file receipt, reducing the need for manual creation and intervention.
  • CSR’s can easily update job ticket user-defined fields when job changes (special inserting instructions or material changes) are required, reducing the need for internal IT resources to make such changes.

Uluro can support all of your camera and scanner requirements via the creation and printing of virtually all font-based barcodes. Examples include:

  • Production (2 Dimensional (2D) or Matrix): 2D, DataMatrix, QR Code, PDF417
  • Postal Specific: Intelligent Mail Barcode (IMB), POSTNET, PLANET
  • Production (Linear or 1D): Code 25 (2of5), Code 39 (3of9), Code 128, Codabar
  • Other: OMR, OCR

Uluro allows for various methods in which a client “pull list” (any user-defined grouping of data that requires special handling) can be created and handled accordingly.

  • Automated: This method involves an end user identifying specific records to be segmented via a unique data field or business rule. Uluro automatically segments these identified records and creates a separate job file to be handled accordingly within production.
  • Web Proof: This method involves an end user identifying specific records to be segmented via a unique data file or business rule. Via the web, the identified records are then provided to the end user prior to production to be analyzed and individually selected for special handling. Records can also be deleted.

Uluro’s SQL backend delivers an amazing internal mail tracking solution that can provide your organization with mail tracking files to suit any custom ADF suite.

Standard:

  • JIF
  • MRDF
  • HAL
  • IDF
  • IDX
  • KIC

These files can be automatically created and submitted to any internal tracking solution. The open database backend makes reporting and tracking integration simple and ensures that all data is easily available when needed.

Tracking files contain names, addresses and other pertinent information for every record that is contained within a file. This tracking file is automatically generated and uploaded from Uluro.

This file can be accessed by intelligent inserters and camera systems when the job is active to ensure that 100% of records are inserted and mailed. Uluro allows you to quickly identify the existence of duplicate, missing and out-of-sequence documents, eliminating the opportunity for those pieces to be erroneously inserted and mailed.

Uluro provides several types of standard audit reports before, during and after each job is processed. These include production reports for accounting and quality control, custom reports for end users and postal reports. All reports are generated automatically when the files are processed before reaching the print queue. The reports are then manually selected by the laser operator and printed on demand.

Sampling of Standard Reports includes:

  • File Confirmation Report: electronic confirmation for the end user documenting the name of the file(s) sent, the date and time the file(s) was processed, the count provider by the end user, and the count we actually received and processed (if the end-user includes a record count).
  • Itemized Submission Report: indicates the number of documents and the total number of multiple pages that were submitted and printed. This report can be automatically faxed or emailed to the end user.
  • Bad Address Report: generated during the address cleansing process, our software will catch any incorrect addresses in customer files and will produce a report detailing all addresses that are incorrect or considered undesirable.
  • Account Detail Report: a very detailed report that gives the individual’s account ID, account name, and exact dollar amount billed. It also can identify any specific exclusions requested by the client (i.e. any individuals with zero balances or credit balances).

Custom reports can easily be built to meet any additional needs or end-user requirements.

Uluro’s Print Select module provides a simple GUI that can identify and locate any document within seconds. Print Select offers multiple solutions in regards to the reprint process:

  • Manually generate an individual reprint by selecting the production file and keying in any user-defined unique identifier (i.e. account number, sequence number, name, etc.) located on the document.
  • Reprint the entire file as well, or only select a portion of the file that can be segmented by page range, sequence range, account range, tray range, etc.
  • Search for individual reprints across multiple print files if you are not sure which file to select for the required reprint.
  • Uluro enables integration with external ADF solutions for automating the reprint process via system-generated exception files eliminating the need for manual intervention.
  • Production files can be archived in the queue as long as you require.

Tracking is at the heart of Uluro. A database record is created for each data file submission in the system. At each transaction point, the database record for the submission changes status and a transaction database record is created.

Uluro’s tracking database control gives you peace of mind, ensuring every transaction and notification point is tracked, managed and available for easy retrieval in the database.

In today’s production print environment, having trained staff is never enough. A successful production shop needs a job management system that utilizes technology and advanced tool sets to ensure optimal performance. This is Uluro!

Uluro's secure database is a central location to control print files across one or more sites.

  • Security: Advanced security features to control and track access to jobs and print files.
  • Grouping: Group via stock, type, weight or form to reduce the number of required paper changes and maximize your production efficiencies.
  • Search: Staff can quickly search hundreds or thousands of files to locate the desired job.
  • Status: Jobs are automatically marked as completed or printed to lower the chance of double printing.
  • Resubmission: Job resubmission is rights-based and tracked in the reporting to ensure tracking of mail piece integrity and stock while reducing duplication chance.
  • Queue Depth: Advanced SLA features and job access administration controls can eliminate cherry-picking and ensure high-priority jobs are not overlooked for easy single-stock long-run jobs.
  • Access: The system automatically logs out inactive users to prevent unauthorized access to print files and data.

Set your delivery method with a click of a button. Uluro makes switching from hard copy to email to online presentment simple.

  • Auto-combine jobs based on defined business rules
  • Select the presort method via a simple drop-down selection
  • Enter weights and thickness to determine the exact tray and pallet size
  • Easily select/call out any outside program written in any language (i.e. PERL) for pre-processing and post-processing. This allows your programmers to continue writing code in the language they prefer and know best.

Uluro completely automates the receipt and pre-processing process without the need for manual intervention.

  • Automatically receive data via Secure FTP (FTPS), email or web submission
  • Perform data validation audits such as MD5SUM (a digital fingerprint ensuring no file is submitted twice), verifying page length, checking for missing fields, ensuring validity of account ID, confirming dollar balances and calculations and pattern matching
  • Send out an automated email notification to selected contracts indicating complete file receipt, specific counts received and accuracy of data, or alert contacts if errors are present
  • Upon successful receipt and validation, data files are immediately submitted for online proofing or directly into production if proofing is not required
  • Using Uluro’s OnceAmation® technology, an application is set up once and files can be securely transmitted, validated and automatically submitted to production without IT intervention.
Contact Uluro’s sales representatives for more information on uTrack or to request a quote.

Uluro’s uSecure workflow removes the complexities and security issues around key management. There is no longer a need for your client to provide a key for the data.

The UXP technology within uSecure lets the protection travel with the data file. This eliminates the need for key management, documenting and controlling access to secure keys, or spending hours decrypting large data files for processing. uSecure simplifies the production data processing task.

uSecure advanced workflow enables processing, delivery and presentment of data without ever having to decrypt the entire data file. The revolutionary Uluro uSecure workflow reduces the risk of data breaches. No other production workflow can provide the protection provided by uSecure.

Uluro’s new uSecure workflow enables you or your client to include a “Use-by” date or destruction date.

No longer do you need to rely on script processing or calendars. uSecure imbeds an intelligent object within the data file that enables the data owner or the data processor to schedule a destruction date. The data can never be accessed outside of the date range and will be securely shredded should the data be accessible.

With uSecure, you can manage all your data destruction policies without the need for dedicated projects or massive data audits.

By imbedding an intelligent data object within every data file, uSecure reduces the inherent gaps in legacy workflows and protection protocols. The intelligent data object attempts to prevent unauthorized access and can notify data owners of usage and attempted intrusions.  

Other defensive tools gather forensics of the users’ environment including machine, user, and IP information. Embedding an intelligent security object within the data increases your data security, ensuring the file can effectively control access and prevent any breaches. Preventing unauthorized usage provides a competitive advantage and reduces the chance that you ever have to notify your client of a breach.

Make your data SmartData today.

The data is securely protected with 256-bit AES encryption and access is controlled by the imbedded intelligent data object. Only UXP enabled applications can access the data when all verification parameters set by the data owner are satisfied. These may include whether access is within the permitted time frame, is at the correct delivery location, or is within the correct application. Failure to meet any security criteria will result in access being denied.

uSecure ensures that your clients’ data are protected from unauthorized internal and external access at rest, in transit, and during processing.

The UXP technology behind uSecure eliminates these concerns by imbedding intelligence within the data file itself, providing a detailed audit log of all usage throughout the lifecycle of the data file. No longer do you have to rely on legacy hardware encryption and advanced user rights. The intelligent security object logs the who, what, when, and where of file access while gathering detailed data forensics about the machine UUID, IP address, hardware user, and software serial numbers. It can generate a detailed report that can be provided to law enforcement officials. The uSecure workflow completely documents all details of usage and access, giving your clients confidence that their data is protected while providing you with a competitive advantage over your competition.

Do you handle protected health information or Health Insurance Portability and Accountability Act (PHI or HIPAA)? These laws stipulate that all proper security must be used to protect medical data by both the medical provider and any data owner that has access to those records. This means that when you are responsible for the printing, mailing, or the electronic display of medical information, you must provide a secure environment to protect the data used in this processing.

Most printers and mailers center their protection around firewalls and encryption of data, but out of necessity with current technology, they leave the data exposed during processing. The uSecure SmartData product addresses this problem by providing persistent protection of the data during the Uluro document delivery workflow.

With ever-faster internet speeds, it takes only seconds to move a file from one side of the world to the other. Because uSecure imbeds an intelligent protection object within the data, you can control the location—the network and server—on which your data can be accessed. If an attempt is made to move files from a production network to a personal or unauthorized machine, access can be denied and the attempt logged and reported to a pre-determined individual. Controlling accessible locations from within the data is the only way to ensure that a file is used correctly. The intelligent protection in uSecure manages where your data can be used and who can access it. Ensure optimal authentication by controlling where a data file can be used with uSecure.