Tag Archives: it

Software GmbH Hesse Operation

Share calls, anyone can. Now, but also operations or contact records are transferred. So, avoid information losses and accelerated procedures. « Who works in the team, knows the situation: A call is further provided by the attendant or a colleague to you: this is Mr. Muller of the XY company. » And already you are left with […]

Trade Signal

Big steps for user experience and strategy development Bremen, 04.11.2013. Trade signal, the software for the development and optimization of trading systems, is now in the version of 7 available. 2,030 Out feature is the new user interface, which enables easier and faster to achieve the many functions of trade signal. Areas have been completely […]

Digital Rights Management

Optimum data security, digital rights management (DRM) know many with security from the music industry new software of the company. But there is the possibility to provide only those data that are considered as the recipient in the field of computer aided design (CAD) programs. The OLicense suite of the Karlsruhe company optimum is a […]

Matrix Technology

More transparency and service-orientation thanks to proven methodology of standard services such as password reset or Internet access on the appointment of new laptops and the establishment of complete work stations for the provision of business-critical applications and cloud services: An average 700 different typical of a medium-sized company IT Department provides services to their […]

Security Award

Toyota wins the award for the bi-cube identity & access management with single sign-on project this year were on the it-sa (IT security fair) in Nuremberg it security awards. The eponymous magazine awarded to the 8.10.2013 interesting and outstanding projects in the categories of management, security, Web/Internet security, identity & access management, as well as […]

Switzerland AZS

With the job administration, Peris 3010 offers the possibility to create current or planned locations, occupying projects or identify experts. Human resources information system Peris are complemented by the time recording and evaluation time 3010 3010. This serves employees in industry and administration of different work areas, to record their working hours and to get […]


« Usage of bi-cube single sign-on (SSO) for TOYOTA tradition quite in keeping with the TOYOTA tradition of the KAIZEN » – the constant improvement and perfection – the TOYOTA Germany has become after the successful launch of bi-cube identity & access management solution (IAM) now also for use of bi-cube single sign-on (SSO) of the Rostock […]

VAD Passwords

Biometric authentication software recognizes user tip behavior Schorndorf, February 22, 2011 passwords protect against unauthorized access to company information, bank accounts, email accounts Web applications etc., The choice of password risks however. Because simple passwords are easy to crack for hackers and thus form one of the main causes of spied or intercepted data. A […]

Biometric Authentication

Log on to Windows with a biometric USB flash drive on the example of transcend JetFlash 220 fingerprint biometric USB flash drives is possible together with the program of Rohos logon key to use it. So you can login to Windows, after the encrypted partition flash drive has been opened by the USB by the […]

Terminal System

Fingerkey reader casys for cross-industry protection AZS system AG responds to the increasing demands on security and privacy in enterprise and integrated with the Fingerkey biometric reader casys the two operating modes of template on card »and template on system » in the 3010. template on card access systems principle in the template on the card are […]