idgard® and cyber-attacks | idgard®

idgard® and cyber-attacks

idgard® and cyber-attacks

State-of-the-art technologies and procedures protect the idgard® system against external attacks. If hackers were able to break through this protection and gain access to the database, this would be totally useless, since the database is encrypted in such a manner that every user profile is encrypted with an own key. This makes the time and effort needed for such an attempt extremely high, completely unremunerative and fully preposterous. With very time-consuming algorithms, one would have to try to find unknown keys by coincidence.


This article did not answer your question?

We are happy to help you! Just send us a message with your questions and we will get back to you as soon as possible. 


Disclaimer
The content of this online help is intended solely for information and documentation purposes for our product idgard® and can be changed at any time without prior notice. We assume no responsibility or liability for errors or inaccuracies. Due to technical developments, uniscon GmbH reserves the right to change the functional scope of the product at any time.

(C) uniscon GmbH

    • Recent Articles

    • Delete multiple users at the same time

      In the user administration, you can delete multiple user accounts at the same time using batch actions. Which users you can delete depends on your own permissions and on the permissions of the users whose user accounts you would like to delete. To ...
    • Change the user status for multiple users at the same time

      In the user administration, you can deactivate multiple activated user accounts or reactivate multiple deactivated user accounts at the same time. Regardless of which users you select, the batch options are only performed for those users for whom ...
    • Manage permissions for multiple users at the same time

      In the user administration, you can change permissions for multiple users at the same time. Which permissions you can grant or modify depends on your own permissions and on the permissions of the users whose user accounts you would like to edit. To ...
    • Modify user groups and notifications

      You can assign multiple users to the same user groups in the user administration. You can also edit the notification settings for multiple users at the same time. To assign multiple users to the same user groups at the same time, proceed as follows: ...
    • Batch actions

      You can perform actions for multiple users at the same time in the user administration. When you select one or multiple users in the user overview, the available batch options are displayed in the top bar. The user overview, filter, and search field ...
    • Related Articles

    • Buying idgard®

      Purchase via the test version/direct purchase The following instructions apply only to the Essential, Growth, and Enterprise license packages. If you have booked any other package, contact support. Write to support@idgard.com You have two different ...
    • Canceling idgard®

      Canceling your idgard® account The following instructions apply only to the Essential, Growth, and Enterprise license packages. If you have booked any other package, contact support. Write to support@idgard.com You can cancel your idgard® account ...
    • Introduction to idgard®

      Introduction to idgard® idgard® is a cloud service with which data can be confidentially exchanged within organizations and across organizational boundaries. It ensures that the data is encrypted during transfer and remains inaccessible thanks to the ...
    • System requirements for idgard®

      System requirements for idgard® To use idgard®, you do not need to install additional software on your computer. You only need a browser. Check the following points to ensure that your computer is optimally configured for the use of idgard®: To make ...
    • Future developments of idgard®

      Future developments of idgard® idgard® is the first cloud service built on sealed cloud technology, which makes it possible, for the first time, to combine end-to-end security with data processing in the cloud. So far, it was possible either to only ...
    • Popular Articles

    • New features are available in idgard!

      Today’s newsletter covers the most important information about the current updates in the idgard Web App, the integration of idgard in Microsoft Teams and new features in the idgard Mobile Apps. Check out some selected highlights below. Announcement: ...
    • Uploading files

      Uploading files You can upload one or more files up to a size of 5 GB. For a fee, we can increase the size limit of 5 GB for you. You can only upload files with the "Write" permission. There are two methods with which you can upload files to a box. ...
    • Folder upload - behaviors and limitations

      Unsupported characters in file names will be replaced by an underscore during the upload process, this applies to these characters: *, /, \, ?, :, <, >, ^, ", &, | Example: M&A_Overview.xlsx will be renamed to: M_A_Overview.xlsx File names that ...
    • View box activities in the journal

      In data rooms and depending on the setting, certain activities can be registered in a journal. You can view the data room journal if you have the permission to do so. To view box activities in the journal: 1. Open the data room the journal of which ...
    • Welcome to the idgard® online help

      Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...