IT security is of existential importance – and at the same time a prerequisite for successful digitization
According to Bitkom, cyber attacks caused total damage of 223 billion euros to the German economy in 2021. The amount of damage since 2018/19 has more than doubled. The number of business disruptions and system failures caused mostly by ransomware attacks has quadrupled in the same period. In addition, it is becoming increasingly burdensome to meet compliance requirements and survive IT security audits. Information security is more extensive and more complex than ever before: data protection, DSGVO, know-how protection, proof requirements for product liability, mapping of role and rights concepts in user management, security aspects around cloud and IoT technologies and much more. Learn how to make IT security the foundation for successful digitization - instead of treating it as an annoying compliance issue.
Benefits
- Robust IT security architecture for reliable operation
- User management and authentication optionally in Elements or via integration of an IAM system
- Reliable access protection through personalized logins and multifactor authentication (MFA)
- Transport encryption through fully HTTPS-based communication
- Confidentiality, authenticity and integrity of data thanks to combined encryption methods
Robust IT security architecture for reliable operation
With proven security concepts and powerful software solutions, the CONTACT Elements platform enables the end-to-end digitization of business processes. A robust and resilient security architecture based on constantly updated standards and preconfigurations ensures secure system operation and provides protection against cyberattacks. Our reliable incident management process ensures the fastest possible responses to current security incidents and developments. Elements also helps organizations to meet IT security process documentation requirements and secure change processes with component architecture and transparent configuration and software change processes. Event logging and monitoring interfaces help with integration into an existing information security management system (ISMS).
Robust IT security architecture for reliable operation
With proven security concepts and powerful software solutions, the CONTACT Elements platform enables the end-to-end digitization of business processes. A robust and resilient security architecture based on constantly updated standards and preconfigurations ensures secure system operation and provides protection against cyberattacks. Our reliable incident management process ensures the fastest possible responses to current security incidents and developments. Elements also helps organizations to meet IT security process documentation requirements and secure change processes with component architecture and transparent configuration and software change processes. Event logging and monitoring interfaces help with integration into an existing information security management system (ISMS).
With proven security concepts and powerful software solutions, the CONTACT Elements platform enables the end-to-end digitization of business processes. A robust and resilient security architecture based on constantly updated standards and preconfigurations ensures secure system operation and provides protection against cyberattacks. Our reliable incident management process ensures the fastest possible responses to current security incidents and developments. Elements also helps organizations to meet IT security process documentation requirements and secure change processes with component architecture and transparent configuration and software change processes. Event logging and monitoring interfaces help with integration into an existing information security management system (ISMS).
Compliance and end-to-end processes: User management directly in Elements or through IAM integration
CONTACT Elements enables user management and authentication directly through our platform or through the integration of an existing Identity & Access Management (IAM) system. Elements supports robust login methods such as passwordless SSO user authentication, as well as the configuration of flexible password rules to meet compliance requirements. Additionally, multifactor authentication (MFA) of our platform secures access to virtual destinations such as computer, network, database or site access. Connecting an IAM system to Elements allows you to implement centralized logon procedures while providing cost-effective, privacy-friendly user management. Integrate IAM systems such as Microsoft Azure AD/B2C, Keycloak or NetIQ into your system landscape via OpenID Connect interface and ensure end-to-end processes for your IT administration and human resources.
Compliance and end-to-end processes: User management directly in Elements or through IAM integration
CONTACT Elements enables user management and authentication directly through our platform or through the integration of an existing Identity & Access Management (IAM) system. Elements supports robust login methods such as passwordless SSO user authentication, as well as the configuration of flexible password rules to meet compliance requirements. Additionally, multifactor authentication (MFA) of our platform secures access to virtual destinations such as computer, network, database or site access. Connecting an IAM system to Elements allows you to implement centralized logon procedures while providing cost-effective, privacy-friendly user management. Integrate IAM systems such as Microsoft Azure AD/B2C, Keycloak or NetIQ into your system landscape via OpenID Connect interface and ensure end-to-end processes for your IT administration and human resources.
CONTACT Elements enables user management and authentication directly through our platform or through the integration of an existing Identity & Access Management (IAM) system. Elements supports robust login methods such as passwordless SSO user authentication, as well as the configuration of flexible password rules to meet compliance requirements. Additionally, multifactor authentication (MFA) of our platform secures access to virtual destinations such as computer, network, database or site access. Connecting an IAM system to Elements allows you to implement centralized logon procedures while providing cost-effective, privacy-friendly user management. Integrate IAM systems such as Microsoft Azure AD/B2C, Keycloak or NetIQ into your system landscape via OpenID Connect interface and ensure end-to-end processes for your IT administration and human resources.
Reliable encryption ensures authenticity, integrity and confidentiality of your data
Communication between end users and the system takes place entirely using HTTPS, the tap-proof hypertext transmission protocol. Similarly, communication between system components on different computers, for example when transferring user data represented as BLOBs, proceeds using HTTPS transport encryption.
Elements protects data in motion using the hybrid encryption protocol Transport Layer Security (TLS). Encryption is based on the current TLS 1.3 standard with Perfect Forward Secrecy (PFS) and an integrated encryption method called Authenticated Encryption with Associated Data (AEAD). Our platform uses the AE procedure AES in Galois/Counter Mode (AES-GCM). This combination of the encryption process with a Message Authentication Code (MAC) ensures not only confidentiality, but also authenticity and integrity of the data. HTTP Strict Transport Security (HSTS) is an additional security mechanism that protects against both downgrade attacks and session hijacking.
Communication between end users and the system takes place entirely using HTTPS, the tap-proof hypertext transmission protocol. Similarly, communication between system components on different computers, for example when transferring user data represented as BLOBs, proceeds using HTTPS transport encryption.
Elements protects data in motion using the hybrid encryption protocol Transport Layer Security (TLS). Encryption is based on the current TLS 1.3 standard with Perfect Forward Secrecy (PFS) and an integrated encryption method called Authenticated Encryption with Associated Data (AEAD). Our platform uses the AE procedure AES in Galois/Counter Mode (AES-GCM). This combination of the encryption process with a Message Authentication Code (MAC) ensures not only confidentiality, but also authenticity and integrity of the data. HTTP Strict Transport Security (HSTS) is an additional security mechanism that protects against both downgrade attacks and session hijacking.
Related Elements
Verify documents and complex PLM objects faster and meet regulatory requirements
Speed up circulation procedures for verification and approval processes
Meet regulatory requirements and improve validity control and process reliability
Intelligent document logistics: organizing and utilizing know-how enterprise wide
Make all important documents available on every workstation
Save valuable time when searching for documents
Protect valuable know-how
Speed up test and release processes
Comply with regulatory requirements much more easily
Role-based, comprehensive regulation of access to project and product data along their processes, thus protecting know-how
Implement key requirements for know-how protection reliably throughout the entire company
Take advantage of the possibilities offered by a particularly powerful and dynamic rights system
Ensure validity control with reliable version management while at the same time providing support for collaboration
Further Information
Would you like to find out more about this topic? Choose one of the following information offers.