Vintom

Vintom

How it works

Understanding how Vintom system works, its capabilities, implementation process, and the effort required is crucial for our clients. Recognizing these needs, we offers several variants of using the Vintom system. Each variant has a different impact on the client-side implementation workload, the security level concerning sensitive data processing, and the cost model. In this section, we provide a clear and comprehensive guide to these options, helping you understand the system and make the most informed decision for your unique needs.

Standard variant

In this variant, all system components are maintained by Vintom as part of an existing system ready to use and provided in the SaaS model.

This is the best architecture if:

  • The project does not require the use of sensitive data. In each case, it’s worth considering whether the use of a certain variable is necessary to achieve the project goal. For example, using sensitive data such as a surname may prove to be completely unnecessary, and using just the first name in the video and audio layer will be enough to achieve good results.
  • The client does not have the capability to carry out development work in their own infrastructure.
  • The project requires quick implementation.
  • The project will be used only once, as part of a one-off delivery.
  • The level of data protection applied on the Vintom platform is sufficient from the client’s perspective.
  • The project is demanding in the context of rendering, e.g. it uses personalized photos.
  • It is important to easily analyze individual user activity, without the need to build an additional analytics system.
Play Video

High secure variant (banking)

In this variant, no personalized data is processed by Vintom. Data is transferred from the client’s systems directly to the end-user’s browser/application and displayed there in the form of a personalized video. 

This is the best architecture if:

  • The project includes sensitive data.
  • The client’s security policy prohibits the processing of data by a third-party provider.
  • The personalized video needs to be delivered within the client’s systems available only for authenticated users (transaction system, mobile application).
  • The client can host the player and push the data to it within their own infrastructure.
Play Video

If you have any questions, doubts, or need more information on a particular topic, please don’t hesitate to send us a message using our contact form. We’ll be more than happy to assist you.