970-242-4024             PRO Login
PointMan Precision Mobile Utility Data Collection App Features

PointMan Cloud

PointMan’s Cloud runs on Amazon Web Services (AWS), in order to achieve unmatched scalability, flexibility, and security. PointMan’s Cloud running on AWS provides seamless systems integration as well as supports any sized business or government agency, anywhere in the world, in any currency, and in any language. 


PointMan runs natively on AWS and uses industry-standard encryption technology for data at rest and in transit to ensure that whether you are in the field on a mobile device or in the office, you can quickly access your mission-critical data. With PointMan on AWS, we can meet or exceed your core security and compliance requirements such as data locality and redundancy.

Scalable and Flexible

PointMan leverages the systems and operational capabilities of AWS; therefore, it can easily support any sized project anywhere in the world, with any amount of data being stored on the most secure cloud computing environment available. No matter the size of the project, there is no longer a limit to the type or amount of data that can be captured, recorded, and shared in real-time.

Enterprise Integration

PointMan Cloud is designed to support integration with client legacy enterprise systems. PointMan’s Precision Mapping Solution® supports streaming and conflating data from multiple systems of record and the IoT, including CAD, GIS & Web-Mapping Services to both desktop and mobile applications. PointMan empowers customers to leverage modern technology and simplify their current business practices to drive low cost of ownership and operational agility.
PointMan Features Help Meet Industry Standards

Leveraging Industry Standards

PointMan Cloud leverages industry standards and modern web service protocols, including PODS™ data modeling and OGC® open data standards. This enables data to be standardized and streamed directly from data sources to PointMan. Precision Integration utilizes these globally accepted and compliant protocols to provide real-time access to client data and to ensure it can be easily configured and secured.
PointMan Features Help Meet Industry Standards

Business System Integration

PointMan Cloud enhances current business processes by integrating cloud technology with client on-premise business systems, third-party business systems, and the Internet of Things (IoT). This means, PointMan Cloud not only enables businesses to leverage the power of cloud computing, but also to modernize their operations without the added expense of replacing existing business systems.

Ensuring Data Security

Your data security is paramount to us; therefore, our efforts are aimed at exceeding your security and compliance requirements. PointMan ensures each client has their own, secure environment in the most secure AWS cloud. PointMan maintains a Service Organization Control (SOC 2 Type 2) examination and meets the standards for Security and Availability Trust Services Principles with zero exceptions. Along with SOC 2 Type 2 certification, PointMan also maintains SOC 3 certification, which is a public report of internal controls over security, availability, processing integrity, and confidentiality. SOC 2 Type 2 reports demonstrate PointMan’s commitment to critical security policies and proves compliance over an extended period. This is critical for the management of sensitive data including, the location type and condition of infrastructure both above and below the surface.
PointMan Features: Compatible with Major Cable & Pipe Locators

Our Commitment

We recognize the critical importance of maintaining the highest standards of security and privacy for sensitive information. We adhere to industry best practices and regulatory standards, comparable to many government agencies, financial institutions, and Fortune 500 companies. Our compliance with SOC 2 Type 2 is a testament to our dedication to security and availability. Additionally, our SOC 3 certification provides you with a transparent public report, detailing our internal controls over security, availability, processing integrity, and confidentiality.