Set up your own confidential (and anonymous) whistleblowing system.
In order to comply with the provisions of the EU Whistleblowing Directive and the German Whistleblower Protection Act (HinSchG), we have developed an optional whistleblower system module in audatis MANAGER. This whistleblower system module enables you to receive (anonymous) reports in your function as the person responsible and to communicate with the whistleblower (who can remain anonymous) via a secure, encrypted channel.
HITGuard ensures that all GDPR requirements are met.
Implement the requirements of the General Data Protection Regulation efficiently and sustainably. Record and maintain your processing activities (VTs) and order processing contracts in clear registers. Use workflows to collaborate with those responsible for DPAs through self-assessment options to relieve the burden on the data protection officer. Determine requirements in quick checks, document TOMs, create reports and much more.
Exchange large files spontaneously, easily and securely in compliance with the GDPR
With Z1 SecureHub, you can transfer large files securely and in compliance with the EU General Data Protection Regulation. Whether videos, presentations or databases, files can be easily sent and received via your own Z1 SecureHub. All data is stored in your own infrastructure.
Z1 SecureMail Gateway encrypts emails in compliance with the EU General Data Protection Regulation. A high level of automation and centralized rules ensure that emails are not sent unencrypted by mistake. Depending on the recipient, encryption is carried out using PKI certificates or password-based encryption. All processes relating to certificate and password management are highly automated.
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
Comprehensive security suite for computers, data, privacy and more
abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
Protect your data and messages with Cryptshare encryption software and ensure a high level of data protection when sending emails and file attachments. The software makes it easier to meet compliance requirements such as EU GDPR. It is easy to install and configure. Integration with MS Outlook and HCL Notes is possible.