SOLUTIONS FOR SECURE DIGITAL COMMUNICATION
In the field of digitalisation, there are few standard solutions that are suitable for everyone. Businesses have different needs, systems and budgets for security and digital interaction.
Digitization most often starts with the small needs, but eventually more needs will be developed in the business where digitization becomes more of a strategy and a dynamic project. Then it is safe to know that the products in our tailor-made solutions are based on EU standards and will serve as a platform on which to build for the future.
Below is a selection of solutions we have provided.
ACCESS PROTECTION
Login for secure control internally and externally.
An enterprise has both employees and customers who need different levels of access to a common computer system. Internal departments that must have access to data must have tools to handle the information in accordance with the Personal Data Act, and the solution must be secure enough that no one else can access it internally.
The solution is based on a common authentication portal where the employees and one or more responsible persons of the customer are issued a qualified Employee e-ID at the highest security level. Autentiseringen av personen foretas via en nettside som er kryptert med et Commfides EV SSL sertifikat som identifiserer nettstedets eiere og krypterer trafikken.
Internally, Employee e-IDs connects with Active Directory which provides secure and easy management of access to their own systems. The solution comes with a web portal for managing Employee e-IDs for the company and its customers, where you can easily create new users when needed.
Read more about Employee-ID and EV SSL sertificate.
DIGITAL SIGNATURE
Simple and safe solution for electronic signing.
The company wants to streamline case management internally and does this with several digital systems. When a document is to be approved, the digital process breaks down into manual printing, signing and scanning.
The document should then be sent internally or externally, and sometimes also obtain the signatures of internal and external parties.
The solution is based on Signeringsporten which integrates with existing systems internally, such as Microsoft Sharepoint and archive systems. Signeringsporten is set up with predetermined templates and the case manager clicks in the signature box and signs either with a server certificate and password, or a qualified Employee e-ID and PIN code.
Signeringsporten seals the document and automatically notifies the next person in the order, regardless of where the person is sitting. The work process goes on automatically until the last signature is completed, as the document is automatically sealed, timestamped and archived in the archive system.
Read more about Signeringsporten.
DIGITAL ONBOARDING
Automated enrollment of new customers
Enrolling new customers who do not have secure digital identity can be a time-consuming and complicated process. With Commfides Digital Onboarding you can enroll brand new customers and establish the secure digital identity “on the fly”.
Commfides Digital Onboarding comes as part of Commfide’s e-ID Platform with e-ID management and integration tools.
https://www.commfides.com/den-elektroniske-identiteten-kjernen-i-all-digitalisering-google-chrome-17-09-2019-14_08_20_trim/
What is PKI?
PKI stands for Public Key Infrastructure and is a technology that makes it possible to communicate digitally in a secure way.
PKI is today the international standard and framework for issuing, using and managing digital certificates and can be used and shaped in many ways.
PKI is based on so-called asymmetric encryption, which means that you generate two related keys, one public key and one private key. The keys are in fact very large primes, which have the property that what is encrypted with one key can be decrypted with the other. Something that happens completely automatically with “end to end” encryption. The requirement for this to be secure is that only one user has access to the private key, while the public key is accessible to anyone. An encrypted connection occurs when a user encrypts a message with the recipient’s public key, which is then decrypted by the recipient with the sender’s public key.
The private key resides on a smart card, or into a chip on a USB stick. The key is again baked into a digital certificate that links the key and the user’s name, and is protected by a PIN.
A digital certificate opens up many areas of application in encryption, authentication (identification of a person, employee or business) and digital signing.
What makes PKI technology unique are the many combinations it can be used for, while providing a guarantee of accuracy.
HOW DO WE WORK?
Digitization and security need not be expensive and resource consuming. In this category we have the market’s leading products for different needs.
To find the solution that best suits your needs and requirements, we start with a non-binding meeting where you present your digitization project and the needs and challenges you see.
160/5000 We will then present a presentation on a solution, demonstrating the various components together with an offer for total delivery and pricing conditions.
Contact us for an informal talk about your digitization project.