Tech Specs & Security
Microsoft® Windows® 7, Windows 8, Windows 10
Pentium III 600Mhz or higher
128MB of RAM
40MB of hard drive space
Suggested Resolution: 1024 x 768
NOTE: Microsoft Internet Explorer (IE) is being fazed out by Microsoft in August of 2021 and users may experience some issues using the BravoZone. Adobe Flash is no longer supported on any browsers.
Turning Technology Polling App
Is a download that allows the usb receiver and keypads to interact with the BravoZone. The Polling App is only supported on the PC platform.
Maintaining a secure environment for your data is important to us, so that's why we have taken steps to ensure that your data is safe and secure. We have provided a list of common questions you may have regarding BravoZone and the variety of services selected to help ensure that your information is in a secure cloud environment.
Where is BravoZone hosted?
BravoZone is hosted on Rackspace™ which is headquartered in San Antonio, TX. They operate data centers on four continents and is the global leader in hybrid cloud. They offer reliable platforms for software services used by thousands of businesses worldwide. Rackspace security management's model consists of four main stages: Plan, Do, Check, Act, as recommended by the ISO 27001 standard. This standard is recognized globally as the most comprehensive framework for establishing and maintaining information security best practices within an organization.
How secure is the storage space on BravoZone?
Rackspace has compliance and validation phases that help assure their implemented controls are operating effectively and are in sync with the policies set by the security organization. Rackspace adheres to the following information security and related certifications and standards.
PCI-DSS (PAYMENT CARD INDUSTRY DATA SECURITY)
CONTENT PROTECTION AND SECURITY STANDARD (CPS)
What network-level security is used?
BravoZone leverages Rackspace's database access monitoring, SSL encryption and key management solutions to protect your important information. The services are hosted in a protected server environment that uses a firewall and other advanced technology to help prevent interference or access from outside intruders and attacks.