Frequently Asked Questions (FAQ)
Get some quick answers by FAQ category.
EOTAK Server FAQ
What is "TAK Server as a Service" (TSaaS)?
TSaaS means we handle all the backend complexity of hosting, managing, and securing a TAK server. You get all the benefits of a powerful, private TAK server without needing dedicated IT staff or hardware. We provide the server, you focus on the mission.
Can we install our own plugins on the server?
Yes. All our server tiers provide you with full administrative access, allowing you to upload, manage, and distribute your own plugins as needed for your specific operational requirements.
How is data handled and who owns it?
You own your data, period. Your server instance is private to your organization. Data is stored securely within the server's geographic region (US-based for all standard tiers). Our Gov Cloud tier offers specific data retention policies to meet government requirements.
Can we migrate from one tier to another?
Absolutely. We make it easy to scale your server solution as your team's needs evolve. Contact our support team to discuss upgrading your server tier at any time.
What specific encryption standards are used?
We enforce TLS 1.3 for all client-server communications to protect data in transit. All data at rest is secured using AES-256 encryption within our decentralized database.
How is the server infrastructure secured?
Our servers are hosted on RedHat instances within AWS GovCloud, a DOD-authorized environment. We enforce strict firewall rules, disable all SSH access, and block root login from external sources to protect the network perimeter.
What is your process for vulnerability scanning and patching?
We perform daily vulnerability scans using VMDR agents on all nodes, with reports updated hourly. This allows for rapid identification of threats. System components and software packages are updated on a scheduled basis after patches have been tested and validated.
How do you manage system access?
We enforce Role-Based Access Control (RBAC) to ensure least-privilege access across all systems. Administrative access is strictly controlled, and backend APIs are protected by IP-based allowlists, isolating them from public exposure.
Security FAQ
What compliance standards does the EOTAK platform meet?
Our servers are hosted in AWS GovCloud, a DISA-compliant and DOD-authorized environment that supports IL4 (Impact Level 4) workloads for Controlled Unclassified Information (CUI). We apply additional application-layer and network-layer controls to align with IL4 security objectives for sensitive but unclassified operations.
Why does EOTAK align with DOD IL4 standards instead of FedRAMP?
While FedRAMP is important for many government IT systems, its structure can limit the flexibility and interoperability essential for real-time environments like TAK. By focusing on DOD IL4 standards, we maintain the high security required for CUI while preserving the operational freedom and rapid integration needed for true situational awareness.
How is the server infrastructure secured?
Our servers are hosted on RedHat instances within AWS GovCloud, a DOD-authorized environment. We enforce strict firewall rules, disable all SSH access, and block root login from external sources to protect the network perimeter.
What specific encryption standards are used?
We enforce TLS 1.3 for all client-server communications to protect data in transit. All data at rest is secured using AES-256 encryption within our decentralized database architecture to enhance resilience and reduce risk.
How is the EOTAK Admin Dashboard secured from public access?
The dashboard is built with strict isolation between frontend and backend systems. All backend APIs and services are hosted on isolated infrastructure, protected by firewalls that block all public IP access. Communication is only permitted from authorized internal systems, effectively isolating backend services from any public exposure.
How do you manage system access?
We enforce Role-Based Access Control (RBAC) to ensure least-privilege access across all systems. Administrative access is strictly controlled, and backend APIs are protected by IP-based allowlists, isolating them from public exposure.
What is your process for vulnerability scanning and patching?
We perform daily vulnerability scans using VMDR agents on all nodes, with reports updated hourly for rapid threat identification. System components and software packages are updated on a scheduled basis after all patches have been thoroughly tested and validated before deployment.
TAK Stack FAQ
Is the TAK Stack app free?
Yes, the EOTAK TAK Stack application is free to download and use from the Google Play Store.
How is this different from tak.gov or the TPC?
While the TAK Product Center (TPC) is the official repository, TAK Stack is designed as a streamlined mobile-first experience. It simplifies version management and provides a curated, vetted list of essential plugins and maps from multiple sources, including EOTAK partners, saving you time and ensuring compatibility.
Do I need an EOTAK Server to use the app?
No, the TAK Stack app is a standalone tool for managing your ATAK client and resources. However, it is the perfect companion to an EOTAK Server for a fully integrated and managed tactical network.