-
Services
Services
Services--
- Records Management
- Document Storage
- File management
- Media storage
- Vault storage
- Onsite Records Management
- Digital Solutions
- Document Scanning and Indexing
- Digital Contract Management
- Digital Invoice Processing
- Digital Mailroom
- Employee Management (HRDMS)
- Visitor Management System (VIZIO)
- EffiDocX (ECM)
- Information Consulting
- Employee Onboarding
- Digital Signatures
- Fixed Asset Management
- Source Code Escrow
- Banking, Finance and Insurance Solutions
- Central Know Your Customer Automation (CKYC)
- Digital file tracking (DART)
- Business Process Management (BPM)
- Insight
- Case Studies
- About Us About Us
- Locations
- Customer Centre
Cloud-Based Escrow: Modern and Convenient
Store software source codes, licenses, and documentation in a secure, encrypted cloud environment for:
- Ease of Access: Quickly deposit and release materials as needed, with TLS and OWASP-compliant access control, restricted privileges, and detailed access logs.
- Real-Time Updates: Effortless version control and updates, ensuring your materials are always current.
- Scalability: Accommodates businesses of all sizes, providing flexible storage solutions.
Global Security Standards: Ensures compliance with leading regulations, including AES256-bit encryption, role-based authentication, and multi-factor authentication (MFA) for enhanced security.
Physical Vault Escrow: Legacy and Redundant Protection
For those who prefer tangible storage, Crown offers state-of-the-art physical vaults where critical software assets are stored on encrypted media.
- Secure Facilities: Climate-controlled, highly secured vaults.
- Dual Strategy: Ideal for businesses seeking both cloud and physical backups.
Escrow Implementation Guide
Verification and Validation Service
Despite their best efforts, software vendors can sometimes make mistakes, resulting in files that are corrupted, incomplete, password-protected, difficult to use, or infected with viruses. To mitigate these risks, Crown Information Management provides a thorough verification service designed to ensure the integrity and usability of your escrowed materials.
Two-Step Code Verification Process
- Default Verification: Inspection of the folder and submission of a detailed report confirming file names, file types, file sizes, and encryption checks.
- Add-on Verification: Code and build verification to create an executable and confirm the compilation of the source code.
Custom Verification
Customized verification as per client requirements, ensuring the deposited source code and its output match the actual application.
By incorporating these verification steps, we ensure the integrity and reliability of the escrowed materials, providing you with the highest level of protection and peace of mind.
Software Escrow Frequently Asked Questions (FAQ)
A software escrow agreement is a legal arrangement where a third-party escrow agent (like Crown) securely stores software source code, documentation, and other materials. It ensures access to these assets if specific conditions (e.g., vendor bankruptcy) are met.
Software escrow protects businesses from the risks of relying on third-party vendors by ensuring access to critical software and preventing operational disruptions.
Source code, licenses, documentation, and any essential software-related materials, including updates and patches, can be stored.
The licensor deposits assets into a secure, encrypted cloud platform managed by Crown. Assets are continuously updated and can be accessed if the agreed release conditions are met.
Our physical vaults are climate-controlled, monitored 24/7, and equipped with advanced security systems to protect encrypted media.
Code verification is an optional service to validate the completeness and functionality of escrowed materials. While not mandatory, it ensures that released materials are ready for use.
Yes, you can regularly update the deposited materials, ensuring the latest versions are stored.
Assets are released when predefined conditions (e.g., vendor insolvency, contract breach) are met. This process is governed by the terms outlined in the escrow agreement.