Deployment Guide

Cloud Requirements

Prepare your agency for a successful cloud deployment with the technical, connectivity, access, and security requirements needed to support Wildlands Technologies platforms.

Overview

Wildlands cloud deployments are designed to reduce infrastructure burden while maintaining strong security, performance, and operational availability for public safety environments.

Hosted Environment

Applications are deployed in a managed cloud environment with monitored availability and regular maintenance.

Secure Access

User access is protected through encrypted connections, role-based permissions, and identity controls.

Network Readiness

Reliable internet connectivity and properly configured agency network policies are required for consistent performance.

User Preparation

Agency administrators should plan for account provisioning, device readiness, browser support, and training workflows.

1. Connectivity Requirements

  • Reliable high-speed internet connection for all administrative and operational users
  • Low-latency connectivity for dispatch, records, and mobile workflows
  • Redundant internet options recommended for mission-critical sites
  • Firewall and content filtering rules must allow approved Wildlands service endpoints
  • Consistent connectivity for field and remote users where mobile access is required

2. Supported Access Environment

  • Current versions of major browsers such as Microsoft Edge, Google Chrome, or Mozilla Firefox
  • JavaScript enabled and browser updates managed according to agency policy
  • Screen resolution sufficient for operational dashboards and data-entry screens
  • PDF viewing capability for system-generated reports and exported records
  • Agency-managed workstation standards recommended for consistency and supportability

3. User & Identity Requirements

  • Named user accounts for all personnel accessing the platform
  • Role-based permissions defined by agency administrators
  • Multi-factor authentication strongly recommended or required based on deployment policy
  • Password standards aligned with agency and compliance requirements
  • Documented onboarding and offboarding procedures for personnel changes

4. Security & Compliance Readiness

  • Review of agency security policies related to cloud-hosted operational systems
  • Approval of access methods, remote usage, and data handling expectations
  • Support for encrypted web sessions and secure authentication controls
  • Endpoint protection on agency-managed devices accessing production data
  • Coordination with agency compliance stakeholders for CJIS or other applicable standards

5. Operational Preparation

  • Identification of agency administrators, project leads, and technical contacts
  • User roster and role mapping prior to implementation
  • Configuration review for workflows, forms, locations, units, and permissions
  • Training plan for dispatchers, records staff, supervisors, field personnel, and administrators
  • Go-live support planning and escalation contacts for launch readiness

Implementation Notes

Final requirements may vary based on modules, integrations, authentication methods, and agency-specific security or compliance obligations.

Integration Planning

Interfaces with GIS, CJIS, court, justice, or third-party platforms may introduce additional networking and configuration requirements.

Device Readiness

Operational users should have access to supported agency-approved devices that meet internal standards for secure use.

Policy Alignment

Cloud deployment should be reviewed alongside internal security, retention, access, and operational continuity policies.

Training & Adoption

Early planning for training, administrators, and go-live support helps ensure a smoother transition into production use.

Confirm Your Agency's Cloud Readiness

Reach out to review environment requirements, deployment options, and preparation steps for a successful Wildlands cloud implementation.