IT Security in the Cloud

Cyber security is the key for digital transformation. Learn more about the security concept of the platform and how oneclick™ supports you in the implementation of strict protective measures. Use oneclick™ and safeguard yourself on the highest level!
Optimal Security with oneclick™

Protect your Applications, Data, Networks and yourself!

oneclick™ follows the German IT Security Act for critical Infrastructures. The Workspace Provisioning and Streaming Platform meets the highest requirements regarding reliability and information security. Comprehensive provisions have been made:

  1. The redundant structure of critical systems components ensures the platform’s high availability.
  2. Because of the streaming technology in use the transmitted data reach the recipient unchanged and complete.
  3. Due to working within a secure workspace in the browser and a comprehensive rights and role concept, sensitive data is only available to authorized parties.
  4. A multi-level authentication establishes the unique identity of the communication partners.

Place your Trust in our multi-level Security Concept

Patented Security
Multi-layered, intelligent systems protect the platform effectively against internal and external attacks. oneclick™ uses a highly secure Lock Keeper Principle in the Authentication and Delivery Process.

  Benefit from our encrypted and protected Communication

oneclick™ relies solely on the latest encryption technologies such as TLS1.2 and the use of Extended Validation Certificates (EV-SSL). The use of in-house asynchronous streaming technology, which is permanently being further developed, removes security risks such as TLS compression.

  Make your streamed Target Infrastructure invisible for Attackers

Outdated operating systems and applications are in their structure often no longer sufficient for today’s threat level. But: What you can’t see, you can’t attack. With oneclick™, your existing system is no longer operated openly in the internet, but is connected to the Workspace Provisioning & Streaming Platform. The IP address of your enterprise network is masked through the connection in the back end, which makes it invisible for external parties.

  Rely on Secure Browsing

Web servers are one of the key distribution methods for malware, which is loaded undetected and activated onto the local system during a user’s visit of an infected website. When you visit webpages using oneclick™, then the browser is encapsulated in a virtual machine and runs on a hardened guest operating system.

  Active Monitoring

oneclick™ monitors all platform components and network access points around the clock. This pro-active monitoring ensures that the Service Management Center of oneclick™ is always informed about the status of the platform and able to take protective measures, if required.

  Secure Login to your Applications

No user data and passwords are transmitted to devices through the backend authentication. The login of the oneclick™ platform is done via clientless credentials transfer and is not transmitted from the client to the application.

  Connect your distributed Locations with high Security

A permanent VPN tunnel according to the IPSec framework (Internet Protocol Security) is set up for a secure communication between the oneclick™ platform and the target infrastructure. IPSec guarantees strong encryption and data integrity.

  Increase your Productivity with the use of standardized Network Protocols and Ports

With the provision of its platform services, oneclick™ throughout relies on standardization of the implemented network and transfer protocols and ports. This guarantees oneclick™ availability of its services from almost all infrastructures and supports network operators with the implementation of their compliance guidelines and control functions.

  Build upon our secure Platform Development

Security is a fixed component of our Software Development Life Cycle (SDLC). We consider hereby security aspects throughout all stages of the software development process according to the Open Web Application Security Project (OWASP). Only programs and modules are used that have been correctly tested and released by the person responsible for security. As part of the quality management, regular code reviews, vulnerability and penetration tests take place.

  Hide your Source Code

oneclick™ offers its own solutions to display websites. This allows a better protection than standard web browsers and minimizes the damage caused through man-in-the-middle attacks. The content of web pages is only transmitted to the client as a stream and not as HTML code.

  Automatic Security

As standard, oneclick™ is protected by a multi-layered combination of firewall and service defined network rules. Strong DdoS safeguards also exist. With IPS/IDS and WAF, further security technologies are integrated, which complete the total protection portfolio.

  Close all Back Doors

We guarantee you: no back doors! With oneclick™, you take over control of access to your applications and data. Unnoticed removal – neither customer data or process descriptions – is no longer possible thanks to oneclick™.

  Maintain Control of your Data

When using oneclick™, no additional data is collected or saved, but the platform simply enables their secure access via the implemented streaming technology. In the backend stored are only user name, passwords and profile information required for the login. Your profiles are stored encrypted and in technologically isolated storage systems.

Benefit from our work in IT Security Associations

30 days – full feature-set – free & without obligation

Or find out in which use cases the oneclick™ platform can help you.