GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
Increase security with Self Service Password Reset
An often underestimated risk for user passwords within a company are automatically generated "forgotten password" requests from outside, especially if the reset of passwords for Active Directory, SAP and other applications is still handled manually via an email to IT. The solution is Self Service Password Reset. Learn now how SSRPM can support your data protection through password management.
Exchange large files spontaneously, easily and securely in compliance with the GDPR
With Z1 SecureHub, you can transfer large files securely and in compliance with the EU General Data Protection Regulation. Whether videos, presentations or databases, files can be easily sent and received via your own Z1 SecureHub. All data is stored in your own infrastructure.
Z1 SecureMail Gateway encrypts emails in compliance with the EU General Data Protection Regulation. A high level of automation and centralized rules ensure that emails are not sent unencrypted by mistake. Depending on the recipient, encryption is carried out using PKI certificates or password-based encryption. All processes relating to certificate and password management are highly automated.
Comprehensive security suite for computers, data, privacy and more
abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.