Connectivity for mainframe solutions (IBM iSeries, IBM zSeries, Siemens BS2000/OSD)
LOG-WEB is a complete solution that supports all current and future mainframe strategies in companies. Based on modern standards, LOG-WEB offers extensive freedom to immediately map changes in structures and processes.
Dynamic refacing and office integration for 5250 programs
The user interface for web browsers and Windows clients is dynamic, fast and easy to maintain based on rules. No recoding or program changes are necessary. The program includes integrated debugging, error handling API support and integration, as well as SSL and VPN support. Printer emulation is integrated. The program is multi-session capable and offers integration with centric for access to any platform. We have the solution if you need native -directly on the AS400- PC formats ...
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
Ready-to-use solutions for the future-proof digitalization of your GRC processes
The success of innovative organizations can be sustainably increased through the digitalization of GRC processes.
We make this possible with our BIC GRC software, which offers our customers flexible and adaptable custom solutions or ready-to-use standard solutions:
BIC Enterprise Risk
BIC Internal Control
BIC Corporate Sustainability
BIC Information Security
BIC Business Continuity
BIC Data Protection
BIC Internal Audit
many other GRC use cases (Compliance, DORA and NIS-2)...
Exchange information and large files securely, easily and traceably by email. Cryptshare enhances your existing e-mail system with security, administrative control, traceability and the ability to exchange files of unlimited size. In order to live up to our slogan "Making e-mail better", we place particular emphasis on user-friendliness, because software only makes financial and security sense if it is well accepted and popular with users. Therefore, there is no need for software installations, user accounts, procurement of certificates or exchange of public keys on the part of the end user ...
Data protection management software and e-learning from experts: simply use it online!
Data processing agreements, records of processing activities, TOMs, employee training with certificates - the EU General Data Protection Regulation has many requirements - audatis® Manager supports you in dealing with them and ensures that you are on the safe side. The web-based software solution for data protection is multilingual and multi-client capable and is optionally available with industry-specific templates for the register of processing activities.
Thanks to the intuitive user interface, data protection management with CRISAM® is easy to handle for both data controllers and processors. CRISAM® supports the legally compliant recording of company content in the area of data protection. The efficient solution grows with your requirements and can be flexibly adapted to your needs. CRISAM® meets the requirements of the European General Data Protection Regulation and is audit-proof.
Powerful and cost-effective software for data recognition and masking .
IRI FieldShield® is powerful and cost-effective software for data discovery and data masking of PII in structured and semi-structured sources, onsite or in the cloud, static or streaming. The FieldShield utilities in Eclipse are used to profile and de-identify data at rest (static data masking) and the FieldShield SDK is used to secure data in motion (dynamic data masking).
Reporting & masking of PII in Microsoft Excel® spreadsheets
IRI CellShield to find and protect sensitive data (PII) in multiple Excel® spreadsheets: CellShield is the only full-featured, professional data discovery, masking and auditing package for Excel 2010, 2013, 2016 and 2019 (plus Office 365) workbooks on your LAN. CellShield exceeds the security and scope of a single password by combining and automating additional features.
With IRI DarkShield, you can classify, find and delete or otherwise mask sensitive information in various structured, semi-structured and unstructured sources, including: text, PDF and MS Office documents, Parquet and image files, relational and NoSQL collections, and even faces. Whether the PII is on your desktop or anywhere on your network, DarkShield protects it!...
Set up your own confidential (and anonymous) whistleblowing system.
To meet the requirements of the EU Whistleblowing Directive and the German Whistleblower Protection Act (HinSchG), we offer an optional module in audatis MANAGER as a whistleblower system. With the whistleblower system, you can receive (anonymous) reports as the person responsible and communicate with the whistleblower (anonymously) via an encrypted channel.