Document management with triple authentication

Access access authentication

Share post

PROXESS publishes a whitepaper on cybersecurity to protect company data and integrates comprehensive security functions with triple authentication in its document management solution (DMS).

With the three-stage security program of its document management solution, PROXESS manages the balancing act between user-friendliness, comprehensive protection and audit-proof storage of documents - TÜV-tested, in accordance with legal requirements and with additional smart card PIN authorization for supervisors. However, a cybersecurity strategy for the rest of the company's IT infrastructure is also required for comprehensive protection of company data. PROXESS is currently offering a free whitepaper on the topic with a guideline for defending against cyberattacks.

PROXESS 10 a scalable DMS

With its solution PROXESS 10, the software provider and expert for document management offers a scalable DMS with interfaces to numerous ERP, CRM, HR and financial accounting systems as well as office applications and e-mail programs. Correspondingly, confidential documents and sensitive data are collected in the PROXESS system, which must be protected from unauthorized access - both internally and externally. The document management system from PROXESS proves that this comprehensive protection, including audit-proof archiving according to GoBD guidelines, can also be tailored to the relevant roles in the company in a user-friendly manner.

Supervisor has the central role in the security concept

The solution combines detailed, qualitative access rights down to the user level with the encryption of database and files as well as the logging of changes in order to uncover attempts at manipulation on the system. The supervisor - usually a member of the management - has the central role in the PROXESS security concept. Equipped with a PIN-protected smart card, it assigns authorizations to users or delegates this task to so-called "area administrators" - quickly and easily, without the need for extensive IT knowledge.

The area administrators appointed by him are in turn able to carry out user administration and access authorizations within their department. This is made even easier by the integration of Windows Active Directory. In addition, the document management system enables seamless IT administration, including administration of archive structures, databases, data backups and hardware components, without the administrator having access to archive content or inspection of the documents. The PROXESS solution fulfills various access and security needs in an uncomplicated and reliable manner. The installation of a complex ancillary system - for example to protect particularly sensitive documents - is not necessary.

Intelligent encryption processes slow down external threats

But the DMS solution not only reliably stops unauthorized persons internally. Intelligent encryption processes ensure that there is no threat from outside. File contents are protected by means of symmetrical and asymmetrical encryption procedures according to AES (Advanced Encryption Standard) and are thus immune to dictionary attacks. Furthermore, the system not only logs all changes made, but also access to documents - this ensures the integrity of the archived data at all times.

The DMS solution from PROXESS protects sensitive data with its intelligent security functions on the level of the user and database as well as the file system - without complex administration or the installation of a second system. But the security of the DMS alone is not enough, because it is only one component of the entire IT infrastructure of a company.

Protect the entire IT structure optimally against attacks

In order to prevent cyber attacks reliably and, above all, holistically, PROXESS has created a whitepaper that explains how companies can optimally protect their entire IT structure from attacks and what measures must be taken in the event of an attack. Experts such as Heinz Pretz, Head of Software Development and Customer Service at PROXESS GmbH; Silvana Rößler, Head of Security Incident Response & Digital Forensics at networker, solutions GmbH, as well as Dirk Kordus, Chief Claims Officer and Matthias Neumann, Chief Underwriting Officer of the COGITANDA Group, gathered their expertise. The white paper “Connected World - Safe World? How you can protect your company from cyber attacks ”is available for download free of charge.

Directly to the whitepaper at Proxess.de

 


About PROXESS

The two pioneers of document management - Akzentum and HABEL - have been operating together under the new company name PROXESS GmbH with headquarters in Rietheim-Weilheim and branches in Leipzig, Rengsdorf (Westerwald) and in Thayngen, Switzerland, since September 1st, 2019. Since the already established and memorable DMS product name "PROXESS" functions separately from the two company names Akzentum and HABEL, both companies have decided to continue this. And last but not least, the name says it all: “PROXESS”, as a word creation from “Progress” and “Success”, stands for what is to be offered to customers - progress and success in digitization. The joint solution "PROXESS" will evolve away from a pure document management solution towards a future-proof platform for digital processes.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more