IT security is of existential importance – and at the same time a prerequisite for successful digitization

According to Bitkom, cyber attacks caused total damage of 223 billion euros to the German economy in 2021. The amount of damage since 2018/19 has more than doubled. The number of business disruptions and system failures caused mostly by ransomware attacks has quadrupled in the same period. In addition, it is becoming increasingly burdensome to meet compliance requirements and survive IT security audits. Information security is more extensive and more complex than ever before: data protection, DSGVO, know-how protection, proof requirements for product liability, mapping of role and rights concepts in user management, security aspects around cloud and IoT technologies and much more. Learn how to make IT security the foundation for successful digitization - instead of treating it as an annoying compliance issue.

Benefits

  • Robust IT security architecture for reliable operation
  • User management and authentication optionally in Elements or via integration of an IAM system
  • Reliable access protection through personalized logins and multifactor authentication (MFA)
  • Transport encryption through fully HTTPS-based communication
  • Confidentiality, authenticity and integrity of data thanks to combined encryption methods

Robust IT security architecture for reliable operation

With proven security concepts and powerful software solutions, the CONTACT Elements platform enables the end-to-end digitization of business processes. A robust and resilient security architecture based on constantly updated standards and preconfigurations ensures secure system operation and provides protection against cyberattacks. Our reliable incident management process ensures the fastest possible responses to current security incidents and developments. Elements also helps organizations to meet IT security process documentation requirements and secure change processes with component architecture and transparent configuration and software change processes. Event logging and monitoring interfaces help with integration into an existing information security management system (ISMS).

Robust IT security architecture for reliable operation

With proven security concepts and powerful software solutions, the CONTACT Elements platform enables the end-to-end digitization of business processes. A robust and resilient security architecture based on constantly updated standards and preconfigurations ensures secure system operation and provides protection against cyberattacks. Our reliable incident management process ensures the fastest possible responses to current security incidents and developments. Elements also helps organizations to meet IT security process documentation requirements and secure change processes with component architecture and transparent configuration and software change processes. Event logging and monitoring interfaces help with integration into an existing information security management system (ISMS).

With proven security concepts and powerful software solutions, the CONTACT Elements platform enables the end-to-end digitization of business processes. A robust and resilient security architecture based on constantly updated standards and preconfigurations ensures secure system operation and provides protection against cyberattacks. Our reliable incident management process ensures the fastest possible responses to current security incidents and developments. Elements also helps organizations to meet IT security process documentation requirements and secure change processes with component architecture and transparent configuration and software change processes. Event logging and monitoring interfaces help with integration into an existing information security management system (ISMS).

Compliance and end-to-end processes: User management directly in Elements or through IAM integration

Password-less log-ins and MFA authentication ensure secure access protection − whether via CONTACT Elements user management or via the integration of an IAM system

CONTACT Elements enables user management and authentication directly through our platform or through the integration of an existing Identity & Access Management (IAM) system. Elements supports robust login methods such as passwordless SSO user authentication, as well as the configuration of flexible password rules to meet compliance requirements. Additionally, multifactor authentication (MFA) of our platform secures access to virtual destinations such as computer, network, database or site access. Connecting an IAM system to Elements allows you to implement centralized logon procedures while providing cost-effective, privacy-friendly user management. Integrate IAM systems such as Microsoft Azure AD/B2C, Keycloak or NetIQ into your system landscape via OpenID Connect interface and ensure end-to-end processes for your IT administration and human resources.

Compliance and end-to-end processes: User management directly in Elements or through IAM integration

CONTACT Elements enables user management and authentication directly through our platform or through the integration of an existing Identity & Access Management (IAM) system. Elements supports robust login methods such as passwordless SSO user authentication, as well as the configuration of flexible password rules to meet compliance requirements. Additionally, multifactor authentication (MFA) of our platform secures access to virtual destinations such as computer, network, database or site access. Connecting an IAM system to Elements allows you to implement centralized logon procedures while providing cost-effective, privacy-friendly user management. Integrate IAM systems such as Microsoft Azure AD/B2C, Keycloak or NetIQ into your system landscape via OpenID Connect interface and ensure end-to-end processes for your IT administration and human resources.

Password-less log-ins and MFA authentication ensure secure access protection − whether via CONTACT Elements user management or via the integration of an IAM system

CONTACT Elements enables user management and authentication directly through our platform or through the integration of an existing Identity & Access Management (IAM) system. Elements supports robust login methods such as passwordless SSO user authentication, as well as the configuration of flexible password rules to meet compliance requirements. Additionally, multifactor authentication (MFA) of our platform secures access to virtual destinations such as computer, network, database or site access. Connecting an IAM system to Elements allows you to implement centralized logon procedures while providing cost-effective, privacy-friendly user management. Integrate IAM systems such as Microsoft Azure AD/B2C, Keycloak or NetIQ into your system landscape via OpenID Connect interface and ensure end-to-end processes for your IT administration and human resources.

Reliable encryption ensures authenticity, integrity and confidentiality of your data

Communication between end users and the system takes place entirely using HTTPS, the tap-proof hypertext transmission protocol. Similarly, communication between system components on different computers, for example when transferring user data represented as BLOBs, proceeds using HTTPS transport encryption.

Elements protects data in motion using the hybrid encryption protocol Transport Layer Security (TLS). Encryption is based on the current TLS 1.3 standard with Perfect Forward Secrecy (PFS) and an integrated encryption method called Authenticated Encryption with Associated Data (AEAD). Our platform uses the AE procedure AES in Galois/Counter Mode (AES-GCM). This combination of the encryption process with a Message Authentication Code (MAC) ensures not only confidentiality, but also authenticity and integrity of the data. HTTP Strict Transport Security (HSTS) is an additional security mechanism that protects against both downgrade attacks and session hijacking.

Communication between end users and the system takes place entirely using HTTPS, the tap-proof hypertext transmission protocol. Similarly, communication between system components on different computers, for example when transferring user data represented as BLOBs, proceeds using HTTPS transport encryption.

Elements protects data in motion using the hybrid encryption protocol Transport Layer Security (TLS). Encryption is based on the current TLS 1.3 standard with Perfect Forward Secrecy (PFS) and an integrated encryption method called Authenticated Encryption with Associated Data (AEAD). Our platform uses the AE procedure AES in Galois/Counter Mode (AES-GCM). This combination of the encryption process with a Message Authentication Code (MAC) ensures not only confidentiality, but also authenticity and integrity of the data. HTTP Strict Transport Security (HSTS) is an additional security mechanism that protects against both downgrade attacks and session hijacking.

Related Elements

Verify documents and complex PLM objects faster and meet regulatory requirements

Speed up circulation procedures for verification and approval processes

Meet regulatory requirements and improve validity control and process reliability

Intelligent document logistics: organizing and utilizing know-how enterprise wide

Make all important documents available on every workstation

Save valuable time when searching for documents

Protect valuable know-how

Speed up test and release processes

Comply with regulatory requirements much more easily

Role-based, comprehensive regulation of access to project and product data along their processes, thus protecting know-how

Implement key requirements for know-how protection reliably throughout the entire company

Take advantage of the possibilities offered by a particularly powerful and dynamic rights system

Ensure validity control with reliable version management while at the same time providing support for collaboration