Security

Like any other software application, security is very important. 

Security

Every Software Documentation Solution requires Security

Since Software Teams will be storing their Software knowledge in a digitized format in a Software Documentation repository, it becomes vulnerable to security breaches, just like any other Software system. 

No system is 100% safe, but a Software Documentation System especially needs to take extra measures to ensure the system is as secure as possible.  In today’s Cloud based systems, the security has been tested and improved over time and should be adequate to protect the system against external threats. 

However, there is also always the possibility of an internal threat, where a Company employee may attempt to steal as much IP from the Software Documentation System as possible. Therefore, the Software Documentation System should provide monitoring and alerts when activity is detected that goes outside normal usage, such as excessive usage in certain areas.

In reality, even in the case of a security breach, it would be difficult for a company to gain a competitive advantage over another company simply by stealing their Software knowledge. For one, this is Software Knowledge about a Software System.  A Software Documentation System does not give you a Software System.  Therefore, a new Software System would need to be coded from scratch, based on someone’s interpretation of the Software knowledge. Coding a new Software system takes time, testing, and money.  The System would probably be 6-12 months away from even being used.  Therefore, it would be that far behind its competitor. That is, even if there is enough Software knowledge to code a new system from it.  It would probably only be a partial version of the original system, because they would not be able to use the Software knowledge to perfectly recreate what was in the original Software Documentation System.  

Additionally, without the source System (in this case, AppOverview) to use to reconstruct the stolen information, but instead having to piece it back together as many fragments of text, would be very complicated, cumbersome, and maybe impossible.  Basically, an absolute mess. 

In summary, a Software Documentation System should be hosted and equipped with as much security and monitoring as possible, but it would most likely not result in a viable threat to a Company if some of the Software Knowledge was to be somehow be extracted and attempted to be re-used.  The benefits that a Software Documentation System can provide to a Company far outweigh the risk.