Gartner® Predicts 2024: build a sustainable and collaborative digital workplace infrastructure

Welcome to our Blog!

Read our contributions on current trends from the IT world, news about our company and our solution for application deployment as well as customer success stories.

Log4j
Read what the Log4J vulnerability is, what the threat is, and where to find the latest update statuses from the affected companies.
Cybersecurity-2
Successful cybersecurity management protects the most confidential data, increases work efficiency, and improves collaboration.
Unrecognizable male voter holds in his hand a ballot above the ballot box
temino relies on the oneclick™ platform for the secure and web-based delivery of its IT security and data protection solution ISiMap.
oc_cyber_assurance
Remote access to software applications and data via oneclick™ is so secure that there is now even insurance protection for it.
fides
Users of the oneclick™ platform and FIDES gain self-determination over their data by means of digital authorization chains.
unival_title-1
The streaming method of oneclick™ ensures compliance with strict security requirements, high mobility and flexibility.
Blog_Emotet
The economic damage caused by an infection by trojans such as Emotet is immense. Protect yourself from it with oneclick™!
kontroll_ueber_cloud_title1
German companies have made ground relating to cloud strategy. Here, you can discover how companies take advantage of the benefits of the cloud without giving up their control over sensitive data.
Blogcybersicherh1
Cyber Security continues to be a hot topic for debate. 2017 was already a turbulent year regarding cyber attacks - read here what new developments 2018 will bring.
1200x600px_verlaufe_043
They are the gateway to the World Wide Web. Besides well-known browsers such as Firefox, Chrome, Edge and Safari, there are also a number of other less well-known providers. Check out who has come out on top regarding secure surfing and how to find the best browser.
1200x600px_verlaufe_05
The security check point between user and cloud: ✓ Definition ✓ Benefits ✓ Implementation ✓ All you need to know for sustainable cloud security ► Read on!
1200x600px_verlaufe_07_neu-1
Cyber attacks have become more frequent and wide-ranging. One tool to protect yourself from malicious attacks is the oneclick™ Platform.
1200x600px_verlaufe_02-1
oneclick™ already includes all the components of a DMZ, hence a firewall is sufficient to secure a local server location. This is where IT security specialist Anovis comes into play.
1200x600px_verlaufe_07_neu-1
Cloud usage is booming in the German economy. However, security concerns are still an obstacle for the use of cloud technology.
1200x600px_verlaufe_02-1
As the number of malware rises, defence becomes increasingly difficult. With cloud computing, IT security has to be designed as an overall concept.

No results found. Try adjusting your search.

Non-binding advice and trial.