idgard® and cyber-attacks
idgard® and cyber-attacks
State-of-the-art technologies and procedures protect the idgard®
system against external attacks. If hackers were able to break through this
protection and gain access to the database, this would be totally useless,
since the database is encrypted in such a manner that every user profile is
encrypted with an own key. This makes the time and effort needed for such an
attempt extremely high, completely unremunerative and fully preposterous. With
very time-consuming algorithms, one would have to try to find unknown keys by
coincidence.
This article did not answer your question?
We are happy to help you! Just send us a message with your questions and we will get back to you as soon as possible.
Disclaimer
The content of this online help is intended solely for information and documentation purposes for our product idgard® and can be changed at any time without prior notice. We assume no responsibility or liability for errors or inaccuracies. Due to technical developments, uniscon GmbH reserves the right to change the functional scope of the product at any time.
Related Articles
Buying idgard®
Purchase via the test version/direct purchase The following instructions apply only to the Essential, Growth, and Enterprise license packages. If you have booked any other package, contact support. Write to support@idgard.com You have two different ...
Canceling idgard®
Canceling your idgard® account The following instructions apply only to the Essential, Growth, and Enterprise license packages. If you have booked any other package, contact support. Write to support@idgard.com You can cancel your idgard® account ...
Introduction to idgard®
Introduction to idgard® idgard® is a cloud service with which data can be confidentially exchanged within organizations and across organizational boundaries. It ensures that the data is encrypted during transfer and remains inaccessible thanks to the ...
System requirements for idgard®
System requirements for idgard® To use idgard®, you do not need to install additional software on your computer. You only need a browser. Check the following points to ensure that your computer is optimally configured for the use of idgard®: To make ...
Future developments of idgard®
Future developments of idgard® idgard® is the first cloud service built on sealed cloud technology, which makes it possible, for the first time, to combine end-to-end security with data processing in the cloud. So far, it was possible either to only ...