Your European and GDPR-compliant Customer Identity & Access Management (CIAM) Provider on Engity https://engity.com/ Recent content in Your European and GDPR-compliant Customer Identity & Access Management (CIAM) Provider on Engity Hugo en-us Tue, 20 Jan 2026 00:00:00 +0000 Entities https://engity.com/dev/architecture/entities/ Mon, 04 Dec 2023 00:00:00 +0000 https://engity.com/dev/architecture/entities/ <p>In IT, an entity refers to a single and uniquely identifiable information object. It can be an existing or an abstract object. The following entities are used in Engity.</p> API https://engity.com/dev/api/ Wed, 15 May 2024 00:00:00 +0000 https://engity.com/dev/api/ <h2 id="available-resources">Available Resources:</h2> <ul> <li> <p>Readable Documentation: The API documentation is crafted to be clear, concise, and easy to navigate. Endpoint details, request/response formats, and usage examples are presented in an intuitive and developer-friendly manner.</p> EU Cybersecurity & Data Protection Update Q4-2025 https://engity.com/blog/data-protection/cybersecurity-update-q4-2025/ Tue, 20 Jan 2026 00:00:00 +0000 https://engity.com/blog/data-protection/cybersecurity-update-q4-2025/ <p>As it is tradition to note at the beginning of every digest: no quarter is boring, but every single one has its own, very distinct flavor.</p> Secure Funding to Finance Growth! https://engity.com/research-grants-alternative-funding/ Mon, 01 Dec 2025 00:00:00 +0000 https://engity.com/research-grants-alternative-funding/ <section class="showcases bg-auto" id="research-grants"> <div> <div class="title"> <div class="topTitle">Research grants - secure funding</div> <h2>Ask us How You Can Finance Our Services With Funding!</h2> <hr> <div class="subTitle"><p>Would you like to take Identity and Access Management (IAM) in your company to a new level of security, but are unsure how to best finance the necessary investments? As a provider of professional IAM solutions, we know that technology companies invest considerable resources in research and development - and that&rsquo;s exactly where we come in. We support innovative companies in Germany in taking advantage of attractive subsidies and, in the best case scenario, financing our services up to 100%.</p> Cloaking (Phishing) https://engity.com/blog/security/cloaking-attacks-with-phishing-websites/ Tue, 11 Nov 2025 00:00:00 +0000 https://engity.com/blog/security/cloaking-attacks-with-phishing-websites/ <p>Recent studies show that over 90% of all cyberattacks begin with <a class="link regular" href="https://engity.com/tags/phishing/">phishing</a>. And with an estimated 3.4 billion phishing e-mails sent worldwide every day, phishing remains a lucrative business for cybercriminals.</p> What is the Best Protection Against Hacker Attacks, or How Can I Protect Myself Effectively Against Attacks? https://engity.com/blog/security/protection-against-hacker-attacks/ Tue, 28 Oct 2025 00:00:00 +0000 https://engity.com/blog/security/protection-against-hacker-attacks/ <p>With the ongoing digitalization, an ever-increasing part of the value chain is shifting to the Internet. As a result, more data can be found online.</p> Engity's Unique Selling Propositions (USPs) https://engity.com/usps-unique-selling-propositions/ Wed, 22 Oct 2025 00:00:00 +0000 https://engity.com/usps-unique-selling-propositions/ <section class="showcases bg-auto" id="unique-selling-propositions"> <div> <div class="title"> <div class="topTitle">Engity compared to its competitors</div> <h2>Why is Engity the Right Identity Provider for Me?</h2> <hr> <div class="subTitle"><p>Engity is a rapidly growing Identity Provider that offers all the standard services and access factors of a modern access technology provider. Nevertheless, we already stand out thanks to the modern, lean, and cloud-native architecture of our IT infrastructure, which was built from scratch based on the market and technology experience of established, mostly US-based competitors. Our modern platform technology not only allows us to scale virtually at will, but also enables us to offer many unique technological and service features.</p> EU Cybersecurity & Data Protection Update Q3-2025 https://engity.com/blog/data-protection/cybersecurity-update-q3-2025/ Tue, 14 Oct 2025 00:00:00 +0000 https://engity.com/blog/data-protection/cybersecurity-update-q3-2025/ <p>You may have heard this before: &ldquo;America innovates, China replicates, and the EU regulates.&rdquo;</p> OpenID Connect Provider: How to Find the Right Partner for A Seamless Authentication https://engity.com/blog/iam/oidc-openid-connect-provider/ Tue, 07 Oct 2025 00:00:00 +0000 https://engity.com/blog/iam/oidc-openid-connect-provider/ <p>In today&rsquo;s digital landscape, where security and user experience are paramount, OpenID Connect (OIDC) emerges as a game-changer in <a class="link regular" href="https://engity.com/tags/authentication/">authentication</a>. Understanding how to utilize OpenID Connect providers can significantly enhance your applications, making the login process smoother and more secure. Imagine a world where users can sign-in seamlessly, without juggling multiple <a class="link regular" href="https://engity.com/tags/password/">passwords</a> or worrying about data breaches. This article will demystify OpenID Connect, empowering developers and businesses alike to harness its capabilities. From exploring the fundamental concepts to discussing the choice of providers, we&rsquo;ll cover everything that is essential to unlock the potential of seamless authentication. Let the right OpenID Connect provider help you master the challenges of user-friendly authentication in a secure way.</p> What is Brushing Scam? How to Protect from this Sneaky Online Fraud? https://engity.com/blog/security/what-is-brushing-scam/ Tue, 30 Sep 2025 00:00:00 +0000 https://engity.com/blog/security/what-is-brushing-scam/ <p>In today’s digital age, online shopping offers unparalleled convenience but lurking behind the ease of pressing a “buy now” button is a gloomy threat: the brushing scam. This insidious form of online fraud involves deceitful sellers shipping items to unsuspecting victims, often to inflate their sales figures and improve their ratings. For many, the first hint of trouble comes in the form of unexpected and unsolicited packages arriving at their doorsteps, accompanied by confusion and concern. But fear not—by shedding light on this sneaky scam, we empower ourselves to protect our wallets and personal information. In this article, we’ll explore the tactics used by scammers, share real-life stories, and equip you with important tips to better recognize and combat the rapidly evolving brushing scam. Join us as we unmask this deceptive ploy and ensure your online shopping experience remains safe and secure.</p> Password-Spraying-Attack https://engity.com/blog/security/password-spraying-attack/ Tue, 05 Aug 2025 00:00:00 +0000 https://engity.com/blog/security/password-spraying-attack/ <p>Password spraying attacks belong to the group of <a class="link regular" href="https://engity.com/blog/security/what-is-a-brute-force-attack/">brute force attacks</a>, but differ significantly in how the attackers proceed. While attackers in a brute force attack generally focus on one user account and try out any number of <a class="link regular" href="https://engity.com/tags/password/">passwords</a>, a password spraying attack is carried out on countless user accounts simultaneously using one or a few passwords.</p> Social Logins & Social Sign-Ups as Easy Access to Your User Account https://engity.com/iam-product/social-logins-and-social-sign-ups-for-authentication/ Mon, 28 Jul 2025 00:00:00 +0000 https://engity.com/iam-product/social-logins-and-social-sign-ups-for-authentication/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="what-are-social-logins-and-social-sign-ups">What are Social Logins and Social Sign-Ups?</h2> <p>Authentication using Social Logins is a process of identification that allows an end-user to use their existing social network`s user account credentials to log in to a third-party application or system. Social Logins eliminate the requirement to create new account credentials for every new website and application where a login functionality exists. Hence, this may be called a kind of single sign-on method for end-users. The idea behind this is that the end-user can use their personal information stored within the social network and share it with other applications. The exchange of information between the different providers is based on the technical standards <a class="link regular" href="https://engity.com/data-security/#openid">OpenID Connect</a> and OAuth.</p> EU Cybersecurity & Data Protection Update Q2-2025 https://engity.com/blog/data-protection/cybersecurity-update-q2-2025/ Tue, 15 Jul 2025 00:00:00 +0000 https://engity.com/blog/data-protection/cybersecurity-update-q2-2025/ <p>Despite its (public and often well deserved) image of bureaucratic overregulation, the EU has its moments of clarity. Doing the right thing at the right time in (mostly) the right manner. A good example of this is the NIS2 directive, aimed at bolstering <a class="link regular" href="https://engity.com/tags/cybersecurity/">cybersecurity</a> and resilience while also establishing a framework for much better cooperation between the member countries through coordination, information-sharing, and joint crisis response.</p> What are Man-in-the-Middle Attacks? https://engity.com/blog/security/man-in-the-middle-attack/ Fri, 11 Jul 2025 00:00:00 +0000 https://engity.com/blog/security/man-in-the-middle-attack/ <h2 id="definition-of-a-man-in-the-middle-mitm-attack">Definition of a Man-in-the-Middle (MitM) attack</h2> <p>If an attacker intercepts data sent between two entities (user, company, server), this is called a Man-in-the-Middle attack (MitM attack for short). The attacker has complete control over the data traffic and can read, intercept and even manipulate the information sent to use it for malicious purposes. In doing so, the attacker pretends to be the respective communication partner and thus obtains <a class="link regular" href="https://engity.com/tags/password/">passwords</a>, access data, account data, TANs, etc.</p> What is Credential Stuffing? https://engity.com/blog/security/what-is-credential-stuffing/ Tue, 01 Jul 2025 00:00:00 +0000 https://engity.com/blog/security/what-is-credential-stuffing/ <p>In the fast paced digital landscape, securing your online accounts becomes more and more essential. As part of the development, credential stuffing is a popular cyber threat and is based on individuals’ tendency to reuse <a class="link regular" href="https://engity.com/tags/password/">passwords</a> across multiple platforms. Attackers use this tactic to exploit stolen username or e-mail credentials and password combinations, gaining unauthorized access to personal accounts and in combination with it sensitive data. With cybersecurity attacks becoming increasingly sophisticated, it&rsquo;s essential to understand how credential stuffing works and, more importantly, how you can protect yourself from this sinister risk. In this blog article, we’ll dive deeper into the mechanics of credential stuffing and prepare you with practical strategies to safeguard your accounts, ensuring that your digital life remains secure. Don’t let cybercriminals compromise your safety - equip yourself with the knowledge to stay one step ahead.</p> Custom Enterprise Single Sign-On Authentication https://engity.com/iam-product/custom-enterprise-single-sign-on-saml-for-authentication/ Mon, 23 Jun 2025 00:00:00 +0000 https://engity.com/iam-product/custom-enterprise-single-sign-on-saml-for-authentication/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="what-is-enterprise-single-sign-on-authentication">What is Enterprise Single Sign-On Authentication?</h2> <p>Every day, more and more employees are expected to handle a growing number of passwords for various applications. Employees either start using passwords more than once, sharing them, or forget their login credentials. As a result, passwords can be stolen or leaked more easily and this leads to a data security at risk. Furthermore, efficiency, user experience, and user-friendliness are compromised.</p> Best Keycloak Alternative: You are no longer happy with Keycloak? https://engity.com/keycloak-alternative/ Fri, 13 Jun 2025 00:00:00 +0000 https://engity.com/keycloak-alternative/ <section class="showcases bg-auto"> <div> <div class="title"> <div class="topTitle">Engity offers you the right Keycloak Alternative</div> <h2>You have experienced some challenges while growing with Keycloak?</h2> <hr> <div class="subTitle">Have you tried Keycloak? Are you dissatisfied with its performance, <a class="link regular" href="https://engity.com/tags/scalability/">scalability</a>, feature set, experiencing unplanned downtime during solution updates, or looking for a fully functional model with support? Do you lack the expertise to implement, operate, and support your own self-hosted Keycloak platform? Even though Keycloak is free, have you found that consulting support and infrastructure costs negate the cost argument? Or do you simply want to outsource your authentication services to experts? If you are familiar with any of the subsequent challenges Engity is your top Keycloak alternative:</div> </div> <div class="content tabs-and-contents"> <ul class="tabs"></ul> <div class="contents"> <article class="showcase show" id="complex-operations" data-label="Complex operations"> <div class="reversed"> <div class="content"> <h3>Complex operations</h3> <div class="text-block"><p>Keycloak gives you the freedom to set up and operate your authentication management system following your needs. However, this requires trained security specialists as well as developers who are not only capable of setting up an IAM platform but also responsible of constantly managing and scaling the platform over time. Additionally, you need to implement the underlying IT infrastructure and maintain it over time.</p> Keycloak Top Alternatives: Other Authentification Method Needed? https://engity.com/blog/iam/open-source-alternatives-to-keycloak/ Fri, 13 Jun 2025 00:00:00 +0000 https://engity.com/blog/iam/open-source-alternatives-to-keycloak/ <h2 id="what-is-keycloak">What is Keycloak?</h2> <p><a class="link regular" href="https://www.keycloak.org/" rel="nofollow">Keycloak</a> is a well-known open-source <a class="link regular" href="https://engity.com/tags/iam/">Identity and Access Management (IAM)</a> solution based on Java allows websites, applications, portals and services to <a class="link regular" href="https://engity.com/tags/authentication/">authenticate and authorize</a> users. It enables the administration of users, authorizations and roles and can be deployed both on-premises (locally on servers) and in the cloud.</p> What is a Keylogger? https://engity.com/blog/security/keylogger/ Tue, 13 May 2025 00:00:00 +0000 https://engity.com/blog/security/keylogger/ <p>A keylogger (also known as a keyboard logger) records and monitors the data entered by a user on the keyboard. This can be either all the data entered or just specific keywords such as <a class="link regular" href="https://engity.com/tags/password/">passwords</a> or PINs and similar. In the past, keyloggers could only capture analog keystrokes, but modern keyloggers can now also record mouse movements, screenshots or virtual key presses.</p> Is My Enterprise Login System Respecting Latest Security Standards? https://engity.com/blog/iam/is-my-enterprise-login-system-secure/ Tue, 06 May 2025 00:00:00 +0000 https://engity.com/blog/iam/is-my-enterprise-login-system-secure/ <p>In today&rsquo;s digitalized world, there are many myths about how what a successful and secure password authentication system should look like.</p> DeviceAuth: Keyboardless Device Login & Authentication https://engity.com/iam-product/deviceauth-keyboardless-device-login/ Fri, 02 May 2025 00:00:00 +0000 https://engity.com/iam-product/deviceauth-keyboardless-device-login/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="deviceauth-as-standard-authentication-process-for-devices-without-a-keyboard">DeviceAuth as Standard Authentication Process for Devices without a Keyboard</h2> <p>TVs, set-top boxes, and gaming consoles were originally developed to provide consumers with a pre-defined set of services. A TV for example was built to show linear TV program via TV cable or satellite. The evolution of the Internet has changed this quite a bit. Formally stupid devices were connected to the Internet and offered immediately smart new opportunities. The most important innovation was the establishment of on-demand and customizable (streaming) services. In order to be able to offer these new customizable services, users must register and log in to use the services.</p> How to Remember a Strong Password, or: An Exploration of Security in the Digital Age https://engity.com/blog/iam/how-to-remember-a-password/ Fri, 02 May 2025 00:00:00 +0000 https://engity.com/blog/iam/how-to-remember-a-password/ <p>In today’s world, where digital activity has proliferated into every aspect of our lives, the challenges of maintaining online security have never been more pressing. The growing number of platforms necessitates an increasing number of <a class="link regular" href="https://engity.com/tags/password/">passwords</a>. In today&rsquo;s technology-driven world, it seems that every system, device, and account requires its own set of unique password-creation rules. Some require an 8-digit, some for a 12-digit password. Others require a mix of lowercase and uppercase letters, numbers, and symbols while some exempt e.g., symbols. Amidst the backdrop of an expanding digital landscape, users are often encumbered with the task of managing a plethora of passwords. These alphanumeric combinations guard everything from our professional correspondences to personal interactions.</p> Passkeys – Secure Passwordless Authentication and Login Method using Biometics https://engity.com/iam-product/passwordless-passkeys-biometrics-authentication/ Fri, 02 May 2025 00:00:00 +0000 https://engity.com/iam-product/passwordless-passkeys-biometrics-authentication/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="passkeys-in-combination-with-biometrics-as-innovative-approach-to-the-classical-authentication-method">Passkeys in combination with Biometrics as Innovative Approach to the Classical Authentication Method</h2> <p>Passkeys are an innovative authentication method designed to enhance online security by replacing traditional passwords with a more secure system based on cryptographic keys and supported by the FIDO alliance consortium. Essentially, a passkey consists of two components: a public key and a private key. The public key is stored on the server, while the private key remains securely on the user’s device. Within the authentication process the web application communicates with the user’s Authenticator (e.g. device wallet or Password Manager) through their local browser or app based on the so called WebAuthn interface. Contrary to username and password authentication which can be compromised while transmitted over the Internet, this dual-key approach minimizes the risk of password theft, as only the private key on the user’s local device can unlock access to an account.</p> Should I Use a Password Manager or the One-Password Solution? https://engity.com/blog/iam/password-manager/ Wed, 30 Apr 2025 00:00:00 +0000 https://engity.com/blog/iam/password-manager/ <p>Having strong and reliable account protection is crucial for users who prioritize their security. A <a class="link regular" href="https://engity.com/tags/password-manager/">password manager</a> can help enabling users to effectively implement a single strong password solution by adding an additional layer of protection. By securely storing all <a class="link regular" href="https://engity.com/tags/password/">passwords</a> in one place (the password manager’s vault), the password manager simplifies the user’s online security. This ensures that the user can easily access their accounts while maintaining robust protection against unauthorized access of all user’s sensitive information. With just one master password to remember, users are assured the utmost security while avoiding the hassle of trying to recall multiple complex passwords. The password manager does the job of securely storing and generating strong passwords for all users’ accounts. This significantly reduces the risk of being hacked, if the tool is used correctly.</p> Efficient Multi-Tenancy Applications & Multi-Tenancy Architectures as Game-Changer for Customer Satisfaction, Partner & Affiliate Management https://engity.com/blog/iam/multi-tenancy-application-multi-tenancy-architecture/ Tue, 29 Apr 2025 00:00:00 +0000 https://engity.com/blog/iam/multi-tenancy-application-multi-tenancy-architecture/ <h2 id="what-is-multi-tenancy-or-the-meaning-of-multi-tenancy">What is Multi Tenancy or the Meaning of Multi Tenancy?</h2> <p>Multi tenancy is a software architecture concept that allows multiple independent instances of one or more applications to operate within a shared environment. This approach is characterized by the following key aspects:</p> What Is Identity and Access Management (IAM)? https://engity.com/blog/data-protection/what-is-identity-and-access-management/ Tue, 22 Apr 2025 00:00:00 +0000 https://engity.com/blog/data-protection/what-is-identity-and-access-management/ <h2 id="iam-definition">IAM-Definition</h2> <p>IAM stands for “Identity and Access Management”. An IAM platform combines rules, policies, processes, and technologies to allow authorized users to access IT resources (e.g., an application, a portal, an intranet, a device, etc.) The goal is to manage digital identities and give the right people access to the right resources. Often similar terms such as IdM (Identity Management) are used interchangeably.</p> EU Cybersecurity & Data Protection Update Q1-2025 https://engity.com/blog/data-protection/cybersecurity-update-q1-2025/ Tue, 08 Apr 2025 00:00:00 +0000 https://engity.com/blog/data-protection/cybersecurity-update-q1-2025/ <p>There are quarters we cover in our Cybersecurity &amp; Data Protection digest during which times seems to move faster than usual. The first three months of 2025 was one of them. This time, the focus is not so much on many small stories but a few big ones that may shape the landscape for the next years – or maybe decades.</p> Password Length vs. Password Complexity: Or Should It Be Password Strength? https://engity.com/blog/iam/password-lenght-vs-complexity-vs-strength/ Tue, 25 Mar 2025 00:00:00 +0000 https://engity.com/blog/iam/password-lenght-vs-complexity-vs-strength/ <p>For years, passwords have been the trusted method for user <a class="link regular" href="https://engity.com/tags/authentication/">authentication</a> across devices and systems. They have become an integral part of our daily routines. They are ingrained in our lives, serving as a familiar and widely used tool for gaining secure access.</p> What is Phishing? https://engity.com/blog/security/what-is-phishing/ Tue, 11 Mar 2025 00:00:00 +0000 https://engity.com/blog/security/what-is-phishing/ <h2 id="phishing-the-dangers-of-the-digital-ocean-or-why-phishing-works-so-well">Phishing: The dangers of the digital ocean or why phishing works so well</h2> <p>The term &ldquo;phishing&rdquo; (a combination of the words &ldquo;password&rdquo; and &ldquo;fishing&rdquo;) refers to an attempt to steal sensitive information, such as usernames, <a class="link regular" href="https://engity.com/tags/password/">passwords</a>, and credit card information, or to induce a transaction or download of malware. Attackers use fraudulent e-mails, text messages, phone calls, or websites as a starting point. As fraudsters&rsquo; tactics have become more sophisticated, this form of cybercrime has evolved over the years to become a serious threat to individuals and businesses.</p> What is a Dictionary Attack? https://engity.com/blog/security/dictionary-attack/ Tue, 18 Feb 2025 00:00:00 +0000 https://engity.com/blog/security/dictionary-attack/ <h2 id="what-is-meant-by-a-dictionary-attack">What is meant by a dictionary attack?</h2> <p>In a dictionary attack, hackers use automated tools to systematically try out a large number of predefined possible <a class="link regular" href="https://engity.com/tags/password/">passwords</a> in a short period of time. These passwords are typically extracted from a predefined dictionary containing words, phrases and characters. The attackers rely on the fact that many people choose weak passwords that can be easily guessed using this method. The combination with additional automated rules, such as the insertion of special characters and numbers, further increases the probability of success of a hacker attack, as more and more users are combining a simple word with numbers and/or special characters for their password.</p> Directors and Managers Are Directly Liable for Data Protection Breaches https://engity.com/blog/data-protection/directors-liability-data-protection-breach/ Mon, 10 Feb 2025 00:00:00 +0000 https://engity.com/blog/data-protection/directors-liability-data-protection-breach/ <p><a class="link regular" href="https://engity.com/tags/liability/">Liability</a> for <a class="link regular" href="https://engity.com/tags/data-protection/">data protection</a> violations is nothing new. Even before the <a class="link regular" href="https://engity.com/tags/gdpr/">GDPR</a> came into force, the legal systems of the EU countries provided for civil and criminal sanctions for the violation of data protection provisions. The GDPR now establishes a broad claim for damages in Art 82 (1):</p> EU Cybersecurity & Data Protection Update Q4-2024 https://engity.com/blog/data-protection/cybersecurity-update-q4-2024/ Tue, 21 Jan 2025 00:00:00 +0000 https://engity.com/blog/data-protection/cybersecurity-update-q4-2024/ <p>As we always say at the beginning of our quarterly <a class="link regular" href="https://engity.com/tags/cybersecurity/">Cybersecurity</a> and <a class="link regular" href="https://engity.com/tags/data-protection/">Data Protection</a> digest: no quarter ever was boring. Yet the fourth quarter of last year was a bit different than the previous ones.</p> What is a Brute Force Attack? https://engity.com/blog/security/what-is-a-brute-force-attack/ Tue, 07 Jan 2025 00:00:00 +0000 https://engity.com/blog/security/what-is-a-brute-force-attack/ <p>In a brute force attack, hackers attempt to guess <a class="link regular" href="https://engity.com/tags/password/">passwords</a> or other credentials to gain access to endpoints and/or user accounts. The attackers try any combination of passwords (trial and error) to get the correct information for a particular user account. Hacking a password can take from seconds to virtually forever, depending on the length and complexity of the password. Depending on the technological structure and therefore the security level of the respective access technology of the portal, application or device, as well as the strength and complexity of the passwords used, password access can practically never be cracked. This is because it is up to the platform operator to decide how many combinations an attacker can test per user in a given period of time (keyword: <a class="link regular" href="https://engity.com/tags/lock-out-functionality/">lock-out functionality</a>).</p> Hacker Attacks on User Accounts and the Search for Weaknesses in the Underlying Access Services: Myths and Facts about Hacking https://engity.com/blog/security/hacker-attacks-on-user-accounts/ Tue, 17 Dec 2024 00:00:00 +0000 https://engity.com/blog/security/hacker-attacks-on-user-accounts/ <p>Almost every day, the headlines report new hacker attacks on entire IT systems or the people who use them. The number of systems and users affected is growing every year, as is the damage caused by data theft, industrial espionage and digital sabotage. According to a study by Bitkom, Germany’s association for the digital industry, the damage to the German economy alone will amount to more than 200 billion euros by 2023. From a business perspective, cyber risks are constantly increasing, not least due to more targeted attacks from Russia and China. Cyber-attacks will be the biggest business risk in 2024 and beyond.</p> Engity’s Advanced & Open-Source SSH-Server Bifröst Using OpenID Connect https://engity.com/blog/iam/bifroest/ Wed, 04 Dec 2024 00:00:00 +0000 https://engity.com/blog/iam/bifroest/ <h2 id="what-is-a-ssh-server">What is a SSH Server?</h2> <p>As the backbone of many critical systems and applications, an <a class="link regular" href="https://engity.com/tags/ssh/">SSH</a> server serves as an essential gatekeeper, safeguarding your valuable infrastructure and upholding the integrity of your online operations. At its core, an SSH server provides a secure and encrypted communications channel, allowing mostly administrators and developers to access remote systems, execute commands and transfer files with unparalleled confidentiality. With the ability to control user permissions, monitor activity, implement robust access controls or manage IT systems in general, it is one of the most powerful tools within an admin’s toolbox. By leveraging advanced cryptographic protocols, a SSH server ensures that your infrastructure including your sensitive information remains protected from prying eyes, safeguarding your organization&rsquo;s most valuable assets.</p> Terms of Service https://engity.com/terms/ Sat, 09 Nov 2024 00:00:00 +0000 https://engity.com/terms/ <p>Version: 1.4</p> <h2 id="1">1. Scope of Services, License</h2> <ol> <li>Engity shall make the Services available to Customer according to these Terms of Service and applicable law and regulations.</li> <li>Engity grants Customer the <ul> <li>non-sublicensable,</li> <li>non-exclusive,</li> <li>nontransferable (except as expressly permitted in <a class="link regular" href="#12">12</a>)<br> right during the Term to allow Customer to access and use the Service in accordance with the Documentation, solely for Customer&rsquo;s business purposes.</li> </ul> </li> <li>Customer agrees and acknowledges that the Services are intended to be used in connection with services and/or infrastructure provided by Customer itself or third parties (&ldquo;Third Party Services&rdquo;). Engity has no influence over such Third-Party Services and cannot be held responsible for their availability or proper functioning.</li> <li>The Services are not intended for use in critical infrastructure or for military use.</li> </ol> <h2 id="2">2. Prices and Billing</h2> <ol> <li>Unless otherwise indicated, prices are listed excluding VAT (if applicable).</li> <li>Within EU but outside of Germany, Customer is advised that Engity must add the applicable VAT if Customer does not provide its VAT identification number. Outside EU, VAT shall be handled according to applicable legal requirements.</li> <li>The price shall adjust once yearly (on January, 1st, but not before the expiry of at least four (4) contractual months) in accordance with the German Producer Price Index for Services (Erzeugerpreisindex für Dienstleistungen) as published on the website of the Statistisches Bundesamt (German Federal Statistical Office) at <a class="link regular" href="https://www.destatis.de/" rel="nofollow">https://www.destatis.de/</a>.</li> </ol> <h2 id="3">3. Use Restrictions</h2> <ol> <li>Customer will not, directly or indirectly, reverse engineer, decompile, disassemble or otherwise attempt to discover the source code, object code or underlying structure, ideas, know-how or algorithms relevant to the Services or any software, documentation or data related to the Services (&ldquo;Software&rdquo;); modify, translate, or create derivative works based on the Services (except to the extent expressly permitted by Engity or applicable law).</li> <li>Customer will not rent out or license out the Service.</li> <li>Customer will use the Services only in compliance with all applicable laws and regulations. Customer is responsible for all activities conducted under its and its Users&rsquo; logins on the Service.</li> <li>Customer agrees to, and will not attempt to circumvent, the limitations or protective measures of the Service.</li> <li>The Services are not intended for use in any country where their use would violate local law including import or export controls.</li> <li>Engity may make available or provide to Customer updated versions of Services.</li> </ol> <h2 id="4">4. Term and Termination</h2> <ol> <li>Unless otherwise stipulated, the Agreement is concluded for an initial period of twenty-four (24) months. It is extended by twelve (12) further months in each case it is not terminated by either Party with at least three (3) months&rsquo; notice to the end of the respective term.</li> <li>Either party may terminate this Agreement <ol> <li>in the event the other party materially breaches this Agreement (in particular does not pay fees due) and does not cure such breach within thirty (30) days of such notice, or</li> <li>immediately in the event the other party becomes the subject of a petition in bankruptcy or any other proceeding relating to insolvency, receivership, liquidation or assignment for the benefit of creditors. Instead of terminating this Agreement, Engity may, at its own discretion, suspend the Customer&rsquo;s access to the Service until the breach of Agreement has been cured.</li> </ol> </li> <li>Either Party may terminate this Agreement by notice with immediate effect for good cause.</li> <li>Unless otherwise stipulated, Freemium Subscriptions can be terminated with a notice period of one (1) month.</li> <li>Any termination notice must be made in at least text form.</li> <li>For the avoidance of any doubt, termination of this Agreement shall have no effect on any outstanding obligations. The confidentiality obligation set forth herein shall survive termination.</li> </ol> <h2 id="5">5. Technical Integration, Support, and Data Processing</h2> <ol> <li>If personal data are being processed by Engity on behalf of Customer, such processing of personal data will be subject of a separate data processing agreement between the data controller and Engity (the &ldquo;DPA&rdquo;).</li> <li>Support and Technical Integration Services can be obtained by Customer through a separate agreement.</li> </ol> <h2 id="6">6. Service Levels</h2> <ol> <li>Definitions. <ol> <li>&ldquo;Available&rdquo; or &ldquo;Availability&rdquo; means that the Core Services of the Engity Platform responds successfully to Customer API Calls and users can perform regular interactions.</li> <li>&ldquo;Core Services&rdquo; means the Engity Authentication Services.</li> <li>&ldquo;Customer API Call&rdquo; means a call by Customer or Customer&rsquo;s End Users to an Engity Core Service API in a Customer Directory.</li> <li>&ldquo;Downtime&rdquo; means times in which the Core Services are not Available. &ldquo;Downtime&rdquo; does not include any time in which the Engity Platform is not Available because of: <ol> <li>scheduled or emergency maintenance,</li> <li>Force Majeure Events,</li> <li>load or penetration testing by Customer, or</li> <li>use of beta or experimental features or services.</li> </ol> </li> <li>&ldquo;Failed API Call&rdquo; means a Customer API Call that does not return the call or returns an error. This excludes excused events, such as <ol> <li>failed Customer API Calls due to client-side application errors outside of the Engity Platform&rsquo;s control, such as calls to: <ol> <li>a custom database,</li> <li>third-party IdPs,</li> <li>Rules, Hooks or Actions,</li> <li>non-Core Service Engity extensibility points, and</li> <li>features not strictly required for a Customer API Call, and</li> </ol> </li> <li>Customer API Calls that do not reach Engity Core Services due to errors outside of the Engity Platform&rsquo;s control (e.g., due to government firewalls or IP blocking).</li> </ol> </li> <li>&ldquo;Directory&rdquo; means a logical isolation unit, or dedicated partition of a particular Engity Platform instance; the dedicated share may be configured to reflect the needs of the specific Customer business unit using the share.</li> </ol> </li> <li>Service Levels <ol> <li> <p>For paid plans, Engity maintains an average Availability per calendar month for the Core Services of at least 99.9% (&ldquo;Availability Level&rdquo;).</p> EU Cybersecurity & Data Protection Update Q3-2024 https://engity.com/blog/data-protection/cybersecurity-update-q3-2024/ Tue, 29 Oct 2024 00:00:00 +0000 https://engity.com/blog/data-protection/cybersecurity-update-q3-2024/ <p>The third quarter of 2024, in terms of data protection and cybersecurity, was interesting, to say the least.</p> Password Check: How Secure is My Password? And How Can I Test It? https://engity.com/blog/iam/password-check-how-secure-is-my-password/ Mon, 28 Oct 2024 00:00:00 +0000 https://engity.com/blog/iam/password-check-how-secure-is-my-password/ <h2 id="attention-hackers-have-struck-again">Attention! Hackers have struck again!</h2> <p>It is the largest password leak in history and now the third record-breaking dump of private and sensitive data records published in 2024. The list so far:</p> Access Solutions for Non-Digital People https://engity.com/iam-product/authentication-solutions-for-non-digital-people/ Wed, 02 Oct 2024 00:00:00 +0000 https://engity.com/iam-product/authentication-solutions-for-non-digital-people/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="alternative-authentication-methods-for-analog-people">Alternative Authentication Methods for Analog People</h2> <p>Older, sick and care-dependent people in particular, but also small children of pre-school age or illiterate people find it difficult to participate in digital life (digital participation). However, access to digital platforms is often the real problem, as this requires registration and regular authentication during use.</p> EU Cybersecurity & Data Protection Update Q2-2024 https://engity.com/blog/data-protection/cybersecurity-update-q2-2024/ Thu, 08 Aug 2024 00:00:00 +0000 https://engity.com/blog/data-protection/cybersecurity-update-q2-2024/ <p>We often open our quarterly data protection and cyber security digest by stating that the space never seems to be boring. Never was this truer than in the last quarter.</p> Multi-tenancy Architecture at Low Costs using Engity's Fully Customizable Environments for Directories https://engity.com/iam-product/multi-tenancy-environments-authentication/ Wed, 31 Jul 2024 00:00:00 +0000 https://engity.com/iam-product/multi-tenancy-environments-authentication/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="multi-tenancy-environments-in-identity-and-access-management">Multi-Tenancy Environments in Identity and Access Management</h2> <p>Customization of front-ends and databases for user &amp; user groups, including look &amp; feel, pricing, rule sets, and permissions is very limited due to tenant/directory technology. Engity’s new Multi-Tenancy Environment approach not only brings scalability without limitations but also full customization opportunities to the digital world. It is a Game Changer for Partner Management and Affiliate Marketing by making new business models possible at an affordable price point.</p> The EU NIS-2 Directive: What Your Business Needs to Know and Do https://engity.com/blog/data-protection/nis2-identity-and-access-management/ Wed, 24 Jul 2024 00:00:00 +0000 https://engity.com/blog/data-protection/nis2-identity-and-access-management/ <p>The aim of NIS 2 is to make sure that so called “essential” and “important” entities are resilient against cyber threats. If your business falls under the sectors outlined by this directive, understanding and complying with its requirements is crucial.</p> EU Data Protection Update Q1-2024 https://engity.com/blog/data-protection/eu-data-protection-update-q1-2024/ Tue, 11 Jun 2024 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q1-2024/ <p>The <a class="link regular" href="https://engity.com/tags/data-protection/">data protection</a> landscape seems to choose one or two dominant topics for every quarter, maybe just to avoid sensory overload. In this fashion, the first quarter of 2024 saw increased regulatory activity in the field of employee data protection and monitoring on the workplace. In particular, <a class="link regular" href="https://engity.com/tags/administrative-fines/">administrative fines</a> were handed out but also help and guidance given by the respective privacy regulators.</p> Is Your Identity & Access Management (IAM) GDPR-Compliant? https://engity.com/blog/data-protection/is-your-iam-gdpr-compliant/ Thu, 21 Mar 2024 00:00:00 +0000 https://engity.com/blog/data-protection/is-your-iam-gdpr-compliant/ <p>Identity and Access Management always involves the processing of personal data. This is because credentials such as an <a class="link regular" href="https://engity.com/iam-product/authentication-with-username-password/">email address and password</a>, or in case of passwordless logins a <a class="link regular" href="https://engity.com/iam-product/passwordless-magic-link/">magic link</a>, etc., must be transferred and compared with stored data. Additional data, such as a phone number or even biometric data, is often required when two-factor authentication or biometric identification comes into play. In addition, the access data is the key to all other data to which the user has access. If, somehow, the <a class="link regular" href="https://engity.com/tags/iam/">Identity and Access Management</a> system can be breached or compromised, identities may be stolen, or valuable data can be exposed.</p> Identity and Access Management (IAM) - Why It Matters and What You Need to Do https://engity.com/blog/data-protection/identity-and-access-management-why-it-matters/ Fri, 08 Mar 2024 00:00:00 +0000 https://engity.com/blog/data-protection/identity-and-access-management-why-it-matters/ <p>Every website, every app, every online service with a login functionality needs to allow its users to <a class="link regular" href="https://engity.com/tags/authentication/">authenticate</a> themselves and must assign them rights and privileges: decide what those users can do, what data they can read, write, modify, and delete.</p> Good Data Protection Makes for Good Business https://engity.com/blog/data-protection/good-data-protection-means-good-business/ Wed, 28 Feb 2024 00:00:00 +0000 https://engity.com/blog/data-protection/good-data-protection-means-good-business/ <h2 id="data-and-algorithms-are-the-new-assets-to-protect">Data and algorithms are the new assets to protect</h2> <p>As individuals, businesses and society at large, we spend more and more time online leaving an ever-growing digital footprint. We transfer data that are condensed into profiles and reveal much about our personalities as well as our political preferences and tastes as consumers. Whoever has access to this data can influence people, steal identities, and cause harm.</p> Company Headquarters and Server Location - Both Must be Right for Data Protection https://engity.com/blog/data-protection/company-headquarters-and-server-location/ Sat, 24 Feb 2024 00:00:00 +0000 https://engity.com/blog/data-protection/company-headquarters-and-server-location/ <p>It&rsquo;s a platitude that <a class="link regular" href="https://engity.com/tags/data-protection/">data protection</a> is important. Yes: data is the oil of the 21st century, data protection is a compliance task, and a personal data breach can spell the end of a company&rsquo;s reputation with customers and suppliers. Every company knows this.</p> EU Data Protection Update Q4-2023 https://engity.com/blog/data-protection/eu-data-protection-update-q4-2023/ Fri, 09 Feb 2024 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q4-2023/ <p>We often start our data protection digest by noting that there is no such thing as a &ldquo;boring quarter&rdquo; in this space. And this holds true for Q4/2023 as well.</p> Cloud IAM or IDaaS vs. On Premise Identity and Access Provision https://engity.com/blog/iam/idaas-vs-on-premise/ Tue, 09 Jan 2024 00:00:00 +0000 https://engity.com/blog/iam/idaas-vs-on-premise/ <p>Engity is a cloud-based <a class="link regular" href="https://engity.com/tags/iam/">IAM</a> or access provider. We deliver IDaaS (Identity as a Service). We do this because we believe that in most cases IDaaS is advantageous when compared to on-premise access management solutions.</p> EU Data Protection Update Q3-2023 https://engity.com/blog/data-protection/eu-data-protection-update-q3-2023/ Tue, 07 Nov 2023 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q3-2023/ <p>The <a class="link regular" href="https://engity.com/tags/data-protection/">data protection</a> landscape has never been boring in recent years. Yet the third quarter of 2023 was a particularly interesting one as some clear themes emerged more visibly than in previous quarters. Some of those developments we shall look at in this report.</p> Trans-Atlantic Data Privacy Framework (TADPF): Fragile Wanting, and Not GDPR Compliant? https://engity.com/blog/data-protection/adequacy-decision-eu-us-data-transfers-legal-opinion/ Fri, 14 Jul 2023 00:00:00 +0000 https://engity.com/blog/data-protection/adequacy-decision-eu-us-data-transfers-legal-opinion/ <h2 id="new-adequacy-decisions-for-eu-us-data-transfers-introduced">New Adequacy Decisions for EU-US data transfers introduced</h2> <p>On July 10, the EU Commission adopted an adequacy decision based on the Trans-Atlantic Data Privacy Framework (&ldquo;TADPF&rdquo;). The Commission is satisfied that the level of protection of personal data in the United States is comparable to that in the European Union. Personal data can therefore flow freely from the EU to the US as long as the receiving company in the US participates in the TADPF. Further safeguards or alternative transfer tools, such as standard contractual clauses, are no longer required.</p> Engity's European Data Protection Update Q2/2023 https://engity.com/blog/data-protection/eu-data-protection-update-q2-2023/ Mon, 10 Jul 2023 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q2-2023/ <p>The data protection landscape stayed interesting in the second quarter of 2023.</p> Engity's EU Data Protection Update Q1/2023 https://engity.com/blog/data-protection/eu-data-protection-update-q1-2023/ Thu, 27 Apr 2023 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q1-2023/ <p>The first quarter of 2023 may easily have been one of the most exciting quarters in privacy and cyber security – ever.</p> EU Data Protection Update Q4 / 2022 https://engity.com/blog/data-protection/eu-data-protection-update-q4-2022/ Fri, 20 Jan 2023 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q4-2022/ <p>The last quarter of 2022 saw no shortage of interesting developments in data protection and, in particular, data security. There were lots of activity in the industry as well as on the legislative and administrative side. The EU in particular reached a political agreement with the US regarding data transfers and started to move towards adoption of this &ldquo;Privacy Shield 2.0&rdquo;. At the same time, tech giants Microsoft and Meta made serious attempts to fix some obvious holes in their obligations to guarantee proper privacy of their user&rsquo;s data while Apple seriously tarnished its positive image in this regard.</p> EU-US Data Transfers under Renewed Scrutiny – the Shopify Case https://engity.com/blog/data-protection/shopify-case-eu-us-data-transfers-under-scrutiny/ Wed, 28 Dec 2022 00:00:00 +0000 https://engity.com/blog/data-protection/shopify-case-eu-us-data-transfers-under-scrutiny/ <p>Data transfers between the EU and the US are again under legal scrutiny. This time the culprits are not Google Analytics, Office 365, or video conferencing software. Instead, a German data protection watchdog investigated Shopify and the infrastructure services surrounding it, in particular Cloudflare.</p> The Technical Implementation of Your IT Landscape Has to Be GDPR-Compliant https://engity.com/blog/data-protection/technical-data-protection-audit/ Mon, 07 Nov 2022 00:00:00 +0000 https://engity.com/blog/data-protection/technical-data-protection-audit/ <h2 id="standard-relationship-between-data-protection-officer-and-company">Standard relationship between Data Protection Officer and Company</h2> <p>It is common knowledge by now and understood by most companies that they not only need a Data Protection Officer but also must comply with data protection regulation in general. As more specialized data protection knowledge is often not available in-house, companies tend to hire an external Data Protection Officer (DPO) who takes over this responsibility.</p> EU Data Protection Update Q3-2022 https://engity.com/blog/data-protection/eu-data-protection-update-q3-2022/ Tue, 11 Oct 2022 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q3-2022/ <p>The third quarter of the year is typically a time, where even privacy activists, lawmakers, lawyers, and administrative people are tanning on the beach. Yet in 2022 there was a flurry of activity, discussions, and developments.</p> Multi-Factor Authentication (MFA) (often called Two-Factor Authentication) https://engity.com/iam-product/multi-factor-authentication/ Wed, 28 Sep 2022 00:00:00 +0000 https://engity.com/iam-product/multi-factor-authentication/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="what-is-multi-factor-authentication">What is Multi-factor Authentication?</h2> <p>Authentication with username and password is generally a very secure way to log in to an application, if done correctly. However, due to weak chosen passwords by the user as well as re-used or shared passwords, millions of user accounts have been hacked and passwords breached. Using more than just a password for authentication but rather additional authentication factors increases the security level of your user account tremendously.</p> Classical Authentication with Username (E-mail) and Password https://engity.com/iam-product/authentication-with-username-password/ Fri, 05 Aug 2022 00:00:00 +0000 https://engity.com/iam-product/authentication-with-username-password/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="what-is-username-and-password-authentication">What is Username and Password Authentication?</h2> <p>Username and password authentication is the most commonly used and best-known method to authenticate a user. It is the traditional method for logging into portals, applications, infrastructure, systems, etc. The authentication principle is based on the &ldquo;something you know&rdquo; (the password) factor.</p> Custom Authentication for Your Registration, Sign-Up & Login Process https://engity.com/iam-product/customization/ Fri, 05 Aug 2022 00:00:00 +0000 https://engity.com/iam-product/customization/ <section class="showcases bg-auto" id="intro"> <div> <div class="title"> <div class="topTitle">Authentication Solution following Your Corporate Design</div> <h2>Customize the Look and Feel of Your Identity &amp; Access Management Solution</h2> <hr> <div class="subTitle">Corporate Identity and Corporate Brand Management become increasingly important in our digitalized world as users expect a user-friendly and tailor-made customer journey from brands they can trust. Consequently, it is our ambition to offer our customers a customized authentication solution following their needs.</div> </div> <div class="content tabs-and-contents"> <ul class="tabs"></ul> <div class="contents"> <article class="showcase show" id="look-and-feel" data-label="Look &amp; Feel"> <div class="reversed"> <div class="content"> <h3>Custom Look &amp; Feel</h3> <div class="text-block">A user or customer usually gets in contact with an authentication solution quite early in their customer journey of consuming a digital product or if buying a physical good online. Hence, it is important that the access management solution can be fully customized to support companies in convincing users from logging in. This can best be achieved if the company&rsquo;s Corporate Branding is fully respected in terms of logo, colors, text, fonts, etc.</div> </div> <div class="image"> <div><picture><source srcset="https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.AWovvL2Ih6dlTniVYganVAOU1ALdu2a5S4081g87jxI.webp 0.5x, https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.DrtuZ9D5p_KjMk1wr5DMSmZ-Ig_i2ZVN1_zdfJMpe6s.webp 1x, https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.WDjEBACg2rdpinljY-OwOg_ENFE2L5xHpQvvbqeGFG0.webp 2x" type="image/webp"><source srcset="https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.OW55EdSB4FnI9D034ri0_mlSaG6O8IgsVgkXhRwdV-o.jpg 0.5x, https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.y_cSR4KMJ-h_kxD3XrcRBJwk764-CBnVfxT-SBYPObc.jpg 1x, https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.gSTk-RJ-L-ZKmFjaEj2dnmvv0zcNfQ1aJIRGMjrxSgY.jpg 2x" type="image/jpeg"><img src="https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.y_cSR4KMJ-h_kxD3XrcRBJwk764-CBnVfxT-SBYPObc.jpg" srcset="https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.OW55EdSB4FnI9D034ri0_mlSaG6O8IgsVgkXhRwdV-o.jpg 0.5x, https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.y_cSR4KMJ-h_kxD3XrcRBJwk764-CBnVfxT-SBYPObc.jpg 1x, https://engity.com/_assets_/custom-look-feel-with-engitys-idm-solution.gSTk-RJ-L-ZKmFjaEj2dnmvv0zcNfQ1aJIRGMjrxSgY.jpg 2x" class="pixel optimized jpeg img-fluid rounded shadow" alt="Collection of Corporate Branding Identity goods, e.g. T-Shirts, cups, hats, pens, customized paper show the possibilities of customization of Engity&#39;s Identity and Access Management solution" title="Custom Look &amp; Feel with Engity&#39;s IdM solution" width="480" height="320"></picture></div> </div> </div> </article> <article class="showcase" id="mailings" data-label="Mailing"> <div class="reversed"> <div class="content"> <h3>Customized Mailings</h3> <div class="text-block">Despite using the Corporate Branding writing an e-mail to customers, it is equally important to customize e.g. welcome, password reset, or error messages to the needs of the companies and its users.</div> </div> <div class="image"> <div><picture><source srcset="https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.1vRwuRqWC_ipkzgwrOjuhFMytYsmfhQi55sNNNRJJfk.webp 0.5x, https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.ldRXwrik-1mXaBqoMAgvVSg15r_1Aosch42_85fc3eY.webp 1x, https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.KDr8zsE94n4I-3zI79Iuw4AAn9hRYMo-PTo2rPrf3Yc.webp 2x" type="image/webp"><source srcset="https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.NuAoN_OX_PYHz-jyn9NIOgXrh0TkjCZ8q0BBIYNOKKE.jpg 0.5x, https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.ywhIndrbKuGjRze6rhdzJ_UnM9JEeHhz9wKxa-cqWec.jpg 1x, https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.F_KXH4C5FrV4K_2O3jPxgE2mwV1j5i9zY3c8fNWtYuE.jpg 2x" type="image/jpeg"><img src="https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.ywhIndrbKuGjRze6rhdzJ_UnM9JEeHhz9wKxa-cqWec.jpg" srcset="https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.NuAoN_OX_PYHz-jyn9NIOgXrh0TkjCZ8q0BBIYNOKKE.jpg 0.5x, https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.ywhIndrbKuGjRze6rhdzJ_UnM9JEeHhz9wKxa-cqWec.jpg 1x, https://engity.com/_assets_/customized-mailings-as-part-of-logging-into-a.F_KXH4C5FrV4K_2O3jPxgE2mwV1j5i9zY3c8fNWtYuE.jpg 2x" class="pixel optimized jpeg img-fluid rounded shadow" alt="Woman is typing on a keyboard and many vector mail icons are flying across the image showing that Engity&#39;s customers can choose which user gets which customized mailing." title="Customized Mailings as part of logging into a service" width="480" height="320"></picture></div> </div> </div> </article> <article class="showcase" id="localized-text" data-label="Localized Text"> <div class="reversed"> <div class="content"> <h3>Custom Localized Text</h3> <div class="text-block">Online services interacting with people from different countries and cultures need a tailor-made and customized local / regional approach, including different languages when approaching these different groups. Engity makes it easy to categorize users in different user groups to address each of them in the right language as well as with the specific local characteristics.</div> </div> <div class="image"> <div><picture><source srcset="https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.UwEtekr3_8i7xeKoizubqgTrFU_MrGW3XLNnZ3fRTlw.webp 0.5x, https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.BMIgu_dgamX70MAeYB7yJ-MqdxQaFeNvzkDooC4349o.webp 1x, https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.pU2kL5VpBA78bHto1rK8mooSdAOEpWjZ0luaK_P0Ioo.webp 2x" type="image/webp"><source srcset="https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.DszHB5rSg_jAkpVbn9QqZiZJQYj9MlZ4ST3bciigJNA.jpg 0.5x, https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.L7QKzoPS0oZwxEXf_UitDPqHoyhU-lVkrFsI2wOKJVw.jpg 1x, https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.r722svAIpnkUqa7XWz_s_m880I1i755KMmNzhxA72oE.jpg 2x" type="image/jpeg"><img src="https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.L7QKzoPS0oZwxEXf_UitDPqHoyhU-lVkrFsI2wOKJVw.jpg" srcset="https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.DszHB5rSg_jAkpVbn9QqZiZJQYj9MlZ4ST3bciigJNA.jpg 0.5x, https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.L7QKzoPS0oZwxEXf_UitDPqHoyhU-lVkrFsI2wOKJVw.jpg 1x, https://engity.com/_assets_/custom-localized-text-as-part-of-engitys.r722svAIpnkUqa7XWz_s_m880I1i755KMmNzhxA72oE.jpg 2x" class="pixel optimized jpeg img-fluid rounded shadow" alt="Group of multinational people holding flags of their home country and are happy that with Engity for every region and language an own customization can be rolled out." title="Custom Localized Text as Part of Engity&#39;s Authentication Solution" width="480" height="320"></picture></div> </div> </div> </article> </div> </div> </div> </section> <section class="showcase show bg-auto" id="domains"> <div class="regular"> <div class="image"><picture><source srcset="https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.kNiwm1SjuKj3kf0fKKPjmskYlH3WQD80YSm-27ZKjes.webp 0.5x, https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.2nEiI_As9TDdxb4V1HnRHmNiNQ8iP-XpazjhZRgFsXo.webp 1x, https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.X2NpAnFQeH8tQ_CBoftPUizyn2Tn2pihJ_nKWOXfCV4.webp 2x" type="image/webp"><source srcset="https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.usLETXLrJxD7Du14viULE2aeWBSBddAS3T94vSzk6Ao.jpg 0.5x, https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.vdy20lHmrYZJ64gumvxR8-GIAgNsMlw77-Uj5v8CsH0.jpg 1x, https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.2G6Llb-Vg6Om_k_RlnpH5try-xzNomsgDYa7ZZ8Jhrk.jpg 2x" type="image/jpeg"><img src="https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.vdy20lHmrYZJ64gumvxR8-GIAgNsMlw77-Uj5v8CsH0.jpg" srcset="https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.usLETXLrJxD7Du14viULE2aeWBSBddAS3T94vSzk6Ao.jpg 0.5x, https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.vdy20lHmrYZJ64gumvxR8-GIAgNsMlw77-Uj5v8CsH0.jpg 1x, https://engity.com/_assets_/custom-domain-or-subdomain-for-your-authentication.2G6Llb-Vg6Om_k_RlnpH5try-xzNomsgDYa7ZZ8Jhrk.jpg 2x" class="pixel optimized jpeg " alt="Vector image illustrating a keyboard with domain name written on it and a colorful ball with many country code endings sitting on it." title="Custom Domain or Subdomain for your authentication solution" width="540" height="360"></picture></div> <div class="content"> <h2>Custom Domain or Your Subdomain Using Engity&#39;s Service</h2> <div class="text-block">Engity offers two alternatives how to authenticate a user. Authentication of a webservice can be performed via a subdomain of Engity&rsquo;s App (e.g. example.engity.app) or by implementing the authentication service within the customer&rsquo;s own domain universe (e.g. id.example.com). Using an Engity subdomain is very simple, fast, and cost efficient. However, end-users can easily see in the URL, that company is using a third-party authentication provider right away. If a company does not want to show that it is using an outsourced Identity and Access Management solution, a customer domain is the right choice.</div> </div> </div> </section> <section class="box-list simple bg-auto" id="hooks"> <div> <div class="title"> <h2>Maximum Possible Customization Using Hooks</h2> <hr> </div> <div class="content"> <article class="simple to-link-from-child" id="webhooks"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-topology-ring-2" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M14 6a2 2 0 1 0 -4 0a2 2 0 0 0 4 0z" /> <path d="M7 18a2 2 0 1 0 -4 0a2 2 0 0 0 4 0z" /> <path d="M21 18a2 2 0 1 0 -4 0a2 2 0 0 0 4 0z" /> <path d="M7 18h10" /> <path d="M18 16l-5 -8" /> <path d="M11 8l-5 8" /> </svg> <h3>Webhooks</h3> </div> <div class="text-block">Engity service calls your web application to allow individual customization following your own logic.</div> </article> <article class="simple to-link-from-child" id="common-hooks"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-template" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M4 4m0 1a1 1 0 0 1 1 -1h14a1 1 0 0 1 1 1v2a1 1 0 0 1 -1 1h-14a1 1 0 0 1 -1 -1z" /> <path d="M4 12m0 1a1 1 0 0 1 1 -1h4a1 1 0 0 1 1 1v6a1 1 0 0 1 -1 1h-4a1 1 0 0 1 -1 -1z" /> <path d="M14 12l6 0" /> <path d="M14 16l6 0" /> <path d="M14 20l6 0" /> </svg> <h3>Common Hooks</h3> </div> <div class="text-block">Solution for standard cases, e.g. validating approved e-mail domains in sign-up process.</div> </article> <article class="simple to-link-from-child" id="server-side-hooks"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-server" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M3 4m0 3a3 3 0 0 1 3 -3h12a3 3 0 0 1 3 3v2a3 3 0 0 1 -3 3h-12a3 3 0 0 1 -3 -3z" /> <path d="M3 12m0 3a3 3 0 0 1 3 -3h12a3 3 0 0 1 3 3v2a3 3 0 0 1 -3 3h-12a3 3 0 0 1 -3 -3z" /> <path d="M7 8l0 .01" /> <path d="M7 16l0 .01" /> </svg> <h3>Server-side Hooks</h3> </div> <div class="text-block">Similar uses cases like webhooks, but managed operations on Engity&rsquo;s servers. No own infrastructure needed.</div> </article> </div> </div> </section> <section class="cta" style="background-image: var(--background-before), url(/_assets_/your-european-and-gdpr-compliant-customer-identity.UsBqrjjrZH7XqVaqujIfy1Xu_aoQ0CbsRuSOfYRkRGM.jpg); background-image: var(--background-before), image-set(url(/_assets_/your-european-and-gdpr-compliant-customer-identity.YB3iAZUnBKCh6JDMoezmmQEBdRKJZl5tLuBJnRx8rUU.webp) 0.5x, url(/_assets_/your-european-and-gdpr-compliant-customer-identity.yymXR_y7IVzo07CrntdVKquWXCpOqLiGoWkaECu2f3A.jpg) 0.5x,url(/_assets_/your-european-and-gdpr-compliant-customer-identity.0NMKM1MJ8FH0Ks4kWPzbXwCRQOSG-y2Dzc__9xJy2ss.webp) 1x, url(/_assets_/your-european-and-gdpr-compliant-customer-identity.UsBqrjjrZH7XqVaqujIfy1Xu_aoQ0CbsRuSOfYRkRGM.jpg) 1x,url(/_assets_/your-european-and-gdpr-compliant-customer-identity.DcfdWsu65EEia7t5JSkazyJFo9j1FNAdSBCB01ZIBQY.webp) 2x, url(/_assets_/your-european-and-gdpr-compliant-customer-identity.AVaWGIhKp_X_FLOW0MQ-322IoWKymyJzzcJr0UVGD-Y.jpg) 2x)"> <div> <div class="content"> <h2>Looking for a Customized User Experience in Identity &amp; Access Management</h2> <div class="description">You want to source an Identity and Access Management solution from a third party? But you do not want to give up your own look and feel? Customization is important for you? Then Engity is the right place for you. Let us discuss which part of your authentication solution you want to have customized!</div> <div class="button-bar centered"> <a href="https://engity.com/contact/" class="button main">Contact Us</a> <a href="tel:+4989716719000" class="button popup-call-us">Call Us</a> <div class="popup-call-us"> <p>Our number is:</p> Easy-Ensure Strong Password Check at Sign-Up for a Secure Authentication https://engity.com/iam-product/easy-ensure-strong-password/ Fri, 05 Aug 2022 00:00:00 +0000 https://engity.com/iam-product/easy-ensure-strong-password/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="only-strong--secure-passwords-should-be-authorized-at-sign-up">Only Strong &amp; Secure Passwords should be Authorized at Sign-Up</h2> <p>Cybercrime is becoming increasingly more commonplace, and the cause is in the majority of cases that compromised passwords are stolen. There are many methods by which hackers can obtain personal passwords to your online accounts. To give you some idea, these may include:</p> EU Data Protection Update Q2-2022 https://engity.com/blog/data-protection/eu-data-protection-update-q2-2022/ Fri, 05 Aug 2022 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q2-2022/ <p>From the vantage point of data protection and privacy, the second quarter of 2022 was characterized by concerns about IT security against the backdrop of the war in Ukraine. Yet the quarter also saw an accelerated pace of legislative and administrative activity as well as some enforcements.</p> Passwordless Authentication using Magic Link or Login Link https://engity.com/iam-product/passwordless-magic-link/ Fri, 05 Aug 2022 00:00:00 +0000 https://engity.com/iam-product/passwordless-magic-link/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="what-is-passwordless-authentication">What is Passwordless Authentication?</h2> <p>With the increasing number of cyber-attacks on the <a class="link regular" href="https://engity.com/iam-product/authentication-with-username-password/">classical password-based authentication method</a>, passwordless authentication is becoming more and more popular. The authentication method is changed from something you know (the password) to something the user has (e.g., smartphone) or something the user is (e.g., fingerprint). There is no longer a need to remember a password.</p> Real-time Push Notifications as Part of an Intelligent Authentication Solution https://engity.com/iam-product/push-notifications/ Fri, 05 Aug 2022 00:00:00 +0000 https://engity.com/iam-product/push-notifications/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="real-time-push-notifications-as-part-of-an-intelligent-authentication-solution">Real-time Push Notifications as Part of an Intelligent Authentication Solution</h2> <p>Engity&rsquo;s Identity and Access Management solution is built flexibly to allow a maximal possible customization of notification services for the various events in real-time. Companies can easily define events e.g.:</p> Seamless Cross Browser & Device Interaction during Registration Process https://engity.com/iam-product/cross-browser-and-device-interaction-at-sign-up/ Fri, 05 Aug 2022 00:00:00 +0000 https://engity.com/iam-product/cross-browser-and-device-interaction-at-sign-up/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="challenges-during-sign-up-processes-using-different-devices-and-browsers">Challenges during Sign-Up Processes using different Devices and Browsers</h2> <p>More and more websites and applications demand a sign-up to get access to content, bank account, e-mail or to be able to shop or to watch a movie. With time, registration processes became more and more standardized and a confirmation e-mail usually completed the sign-up with the validation of the user&rsquo;s e-mail.</p> Breached Password Detection within Engity's Authentication Solution https://engity.com/iam-product/breached-password-detection/ Thu, 21 Jul 2022 00:00:00 +0000 https://engity.com/iam-product/breached-password-detection/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="breached-password-detection-should-be-a-standard-feature-in-every-authentication-solution">Breached Password Detection Should Be a Standard Feature in Every Authentication Solution</h2> <p>Every year again, the steadily increasing number of passwords exposed in data leaks is shocking. In many cases, in addition to the password also the respective username or e-mail address and hence the combined login credentials are compromised and lead to an even larger and more widespread threat. The consequences range from simple identity theft to financial losses.</p> Single Cross Device Login: Log in One Device but Get Access on Multiple Devices without Another Login https://engity.com/iam-product/single-cross-device-login/ Thu, 21 Jul 2022 00:00:00 +0000 https://engity.com/iam-product/single-cross-device-login/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="standard-authentication-on-several-devices">Standard Authentication on Several Devices</h2> <p>Over the last years, it became increasingly common to use multiple devices at the same time. No matter if you have used a computer, a smartphone, a tablet, a smart-watch or another intelligent device, you generally had to login to each and every device before you were able to start working with them. As a consequence, you had to authenticate yourself on each device separately with username or e-mail and password. This exercise was annoying, not user-friendly and always wasted time.</p> User Sign-up and Registration Without the Need of an E-mail Account https://engity.com/iam-product/sign-up-without-the-need-of-an-e-mail/ Thu, 21 Jul 2022 00:00:00 +0000 https://engity.com/iam-product/sign-up-without-the-need-of-an-e-mail/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="standard-registration-process-as-part-of-an-authentication-solution">Standard Registration Process as Part of an Authentication Solution</h2> <p>It is an essential part of IT security and data protection that every employee of a company has independent and individual access (logins) to the IT systems. This is the only way to track who has performed which action in the systems and when. The reasons for this are manifold. On the one hand, this is to prevent unauthorized persons from gaining access to the systems. If there are only shared company accounts, employees will sooner or later be careless with these general login credentials, since no one can prove who passed on the login credentials anyway. On the other hand, actions can only be assigned to employees with individual user accounts. This is particularly important in order to be able to professionally answer queries or to uncover criminal behavior and to be able to meaningfully differentiate authorized from unauthorized access by third parties (like hackers). Last but not least, it is essential and legally required to protect personal data within the framework of the <a class="link regular" href="https://engity.com/tags/gdpr/">General Data Protection Regulation (GDPR)</a>.</p> EU Data Protection Update Q1-2022 https://engity.com/blog/data-protection/eu-data-protection-update-q1-2022/ Sat, 25 Jun 2022 00:00:00 +0000 https://engity.com/blog/data-protection/eu-data-protection-update-q1-2022/ <p>Laws, regulation, and data protection practices change faster than ever before. In the first quarter of 2022, many of the developments in the field concerned data transfers to so called third countries. These are countries where the European General Data Protection Regulation (GDPR) is not applicable and regarding which the EU commission has not issued an adequacy decision. Such transfers need legal grounds in order to be permitted. There have been many new developments in this area.</p> GDPR-compliant IAM solution https://engity.com/gdpr-compliance/ Fri, 01 Apr 2022 00:00:00 +0000 https://engity.com/gdpr-compliance/ <section class="box-list outlined bg-auto" id="mechanisms"> <div> <div class="title"> <div class="topTitle">Data protection built-in</div> <h2>Engity CIAM is GPDR compliant</h2> <hr> <div class="subTitle">Engity has highest standards in technical data protection and avoids data transfers to third countries.</div> </div> <div class="content"> <article class="outlined to-link-from-child" id="data-centers"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-cloud-pin" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M12 18.004h-5.343c-2.572 -.004 -4.657 -2.011 -4.657 -4.487c0 -2.475 2.085 -4.482 4.657 -4.482c.393 -1.762 1.794 -3.2 3.675 -3.773c1.88 -.572 3.956 -.193 5.444 1c1.488 1.19 2.162 3.007 1.77 4.769h.99" /> <path d="M21.121 20.121a3 3 0 1 0 -4.242 0c.418 .419 1.125 1.045 2.121 1.879c1.051 -.89 1.759 -1.516 2.121 -1.879z" /> <path d="M19 18v.01" /> </svg> <h3>Cloud Data Centers in the EU</h3> </div> <div class="text-block">To avoid data transfers into non-GDPR countries.</div> </article> <article class="outlined to-link-from-child" id="eu-headquartered"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-map-pin-2" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M12 18.5l-3 -1.5l-6 3v-13l6 -3l6 3l6 -3v7" /> <path d="M9 4v13" /> <path d="M15 7v5" /> <path d="M21.121 20.121a3 3 0 1 0 -4.242 0c.418 .419 1.125 1.045 2.121 1.879c1.051 -.89 1.759 -1.516 2.121 -1.879z" /> <path d="M19 18v.01" /> </svg> <h3>Engity is headquartered in the EU</h3> </div> <div class="text-block">US companies are subject - even under EU-US Data Privacy Framework - to Patriot-Act and Cloud-Act.</div> </article> <article class="outlined to-link-from-child" id="security"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-shield-lock" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M12 3a12 12 0 0 0 8.5 3a12 12 0 0 1 -8.5 15a12 12 0 0 1 -8.5 -15a12 12 0 0 0 8.5 -3" /> <path d="M12 11m-1 0a1 1 0 1 0 2 0a1 1 0 1 0 -2 0" /> <path d="M12 12l0 2.5" /> </svg> <h3>Designed with data security in mind</h3> </div> <div class="text-block">While not sacrificing ease of implementation and user experience.</div> </article> <article class="outlined to-link-from-child" id="continuous-development-testing"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-refresh-dot" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M20 11a8.1 8.1 0 0 0 -15.5 -2m-.5 -4v4h4" /> <path d="M4 13a8.1 8.1 0 0 0 15.5 2m.5 4v-4h-4" /> <path d="M12 12m-1 0a1 1 0 1 0 2 0a1 1 0 1 0 -2 0" /> </svg> <h3>Constant further development and testing</h3> </div> <div class="text-block">Engity keeps you covered even when the technical or legal landscape changes.</div> </article> </div> </div> </section> <section class="article short bg-auto" id="why"> <div> <div class="content text-block"> <h2 id="why-data-privacy-matters-for-an-identity--access-management-provider">Why Data Privacy matters for an Identity &amp; Access Management Provider</h2> <p>At Engity, we believe that data protection and privacy are not just necessary to be compliant with laws and regulations, but also provide a competitive advantage. Businesses and organizations have neither an interest in administrative fines nor data outflows, reputational damage, or loss of trade secrets. For this reason, we created the Engity CIAM platform as a fully GDPR-compliant cloud-based identity and access management solution.</p> Technical GDPR-Compliance Audit https://engity.com/technical-gdpr-compliance-audit/ Fri, 01 Apr 2022 00:00:00 +0000 https://engity.com/technical-gdpr-compliance-audit/ <section class="box-list spotlight bg-auto" id="core-features"> <div> <div class="title"> <h2>Core Authentication Features</h2> <hr> <div class="subTitle">Design yourself a superb customer journey for your users and select the appropriate features for the best possible user experience!</div> </div> <div class="content"> <article class="spotlight to-link-from-child" id="infrastructure"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-server-2" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M3 4m0 3a3 3 0 0 1 3 -3h12a3 3 0 0 1 3 3v2a3 3 0 0 1 -3 3h-12a3 3 0 0 1 -3 -3z" /> <path d="M3 12m0 3a3 3 0 0 1 3 -3h12a3 3 0 0 1 3 3v2a3 3 0 0 1 -3 3h-12a3 3 0 0 1 -3 -3z" /> <path d="M7 8l0 .01" /> <path d="M7 16l0 .01" /> <path d="M11 8h6" /> <path d="M11 16h6" /> </svg> <h3>Infrastructure Providers, e.g.</h3> </div> <div class="text-block"><ul> <li>Data Centers</li> <li>Identity &amp; Access Management Solution</li> <li>Marketing Automation Solutions</li> <li>Customer Support Solutions</li> </ul> </div> </article> <article class="spotlight to-link-from-child" id="tools"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-section-sign" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M9.172 19a3 3 0 1 0 2.828 -4" /> <path d="M14.83 5a3 3 0 1 0 -2.83 4" /> <path d="M12 12m-3 0a3 3 0 1 0 6 0a3 3 0 1 0 -6 0" /> </svg> <h3>Correct implementation of tools, such as</h3> </div> <div class="text-block"><ul> <li>Cookie Consent</li> <li>Captcha</li> <li>Address Completion Services</li> <li>Content Delivery Networks (e.g. for fonts, images, external data etc.)</li> </ul> </div> </article> <article class="spotlight to-link-from-child" id="office"> <div class="head"><svg xmlns="http://www.w3.org/2000/svg" class="icon icon-tabler icon-tabler-building" width="24" height="24" viewBox="0 0 24 24" stroke-width="2" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"/> <path d="M3 21l18 0" /> <path d="M9 8l1 0" /> <path d="M9 12l1 0" /> <path d="M9 16l1 0" /> <path d="M14 8l1 0" /> <path d="M14 12l1 0" /> <path d="M14 16l1 0" /> <path d="M5 21v-16a2 2 0 0 1 2 -2h10a2 2 0 0 1 2 2v16" /> </svg> <h3>Online Office Apps &amp; Workforce Tools, such as</h3> </div> <div class="text-block"><ul> <li>HR-Software</li> </ul> </div> </article> </div> </div> </section> <section class="cta" style="background-image: var(--background-before), url(/_assets_/your-european-and-gdpr-compliant-customer-identity.UsBqrjjrZH7XqVaqujIfy1Xu_aoQ0CbsRuSOfYRkRGM.jpg); background-image: var(--background-before), image-set(url(/_assets_/your-european-and-gdpr-compliant-customer-identity.YB3iAZUnBKCh6JDMoezmmQEBdRKJZl5tLuBJnRx8rUU.webp) 0.5x, url(/_assets_/your-european-and-gdpr-compliant-customer-identity.yymXR_y7IVzo07CrntdVKquWXCpOqLiGoWkaECu2f3A.jpg) 0.5x,url(/_assets_/your-european-and-gdpr-compliant-customer-identity.0NMKM1MJ8FH0Ks4kWPzbXwCRQOSG-y2Dzc__9xJy2ss.webp) 1x, url(/_assets_/your-european-and-gdpr-compliant-customer-identity.UsBqrjjrZH7XqVaqujIfy1Xu_aoQ0CbsRuSOfYRkRGM.jpg) 1x,url(/_assets_/your-european-and-gdpr-compliant-customer-identity.DcfdWsu65EEia7t5JSkazyJFo9j1FNAdSBCB01ZIBQY.webp) 2x, url(/_assets_/your-european-and-gdpr-compliant-customer-identity.AVaWGIhKp_X_FLOW0MQ-322IoWKymyJzzcJr0UVGD-Y.jpg) 2x)"> <div> <div class="content"> <h2>Contact Us at Engity</h2> <div class="description"><p>We can help you if you need a GDPR-compliant, fully scalable and customizable Identity &amp; Access Management solution.</p> 404 https://engity.com/404/ Mon, 01 Jan 0001 00:00:00 +0000 https://engity.com/404/ <h3 id="page-not-found">Page not found</h3> <p>Sorry, but the page you were trying to view does not exist.</p> About Engity https://engity.com/about-us/ Mon, 01 Jan 0001 00:00:00 +0000 https://engity.com/about-us/ <section class="article short bg-auto" id="offer"> <div> <div class="content text-block"> <h2 id="what-engity-has-to-offer">What Engity has to offer</h2> <p>Engity (<a class="link regular" href="https://engity.com">https://engity.com</a>) offers European companies a privacy and security compliant, cloud-based Identity and Access Management solution as a service. Engity is the right technology partner specifically for start-ups and medium-sized businesses, if websites, portals or databases are to be protected by a secure user and access management, including login.</p> Contact Us at Engity https://engity.com/contact/ Mon, 01 Jan 0001 00:00:00 +0000 https://engity.com/contact/ <p>We offer a GDPR-compliant, fully scalable and customisable Identity &amp; Access Management solution. We are also available to assist with a technical data protection audit to assess your needs!</p> Data Security at Engity https://engity.com/data-security/ Mon, 01 Jan 0001 00:00:00 +0000 https://engity.com/data-security/ <section class="article short bg-auto" id="intro"> <div> <div class="content text-block"> <h2 id="your-customers-data-is-secure-with-engity">Your Customers&rsquo; Data is Secure with Engity</h2> <p>Engity&rsquo;s security team carefully and regularly considers our security strategy to best protect your and your customers&rsquo; data. As part of this exercise, our security specialists monitor current security vulnerabilities and if any formerly considered secure <a class="link regular" href="#protocols">protocols</a> and encryption <a class="link regular" href="#mechanisms">mechanisms</a> are compromised.</p> Legal Notice (Impressum) https://engity.com/legal-notice/ Mon, 01 Jan 0001 00:00:00 +0000 https://engity.com/legal-notice/ <p>Engity GmbH<br> Lamontstr. 9<br> 81679 Munich / München<br> Germany</p> <p>Tel: <a class="link regular" href="tel:&#43;4989716719000" rel="nofollow">+49 89 716719-000</a><br> E-mail: <a class="link regular" href="mailto:[email protected]" rel="nofollow">[email protected]</a></p> Meeting with Gregor Noczinski https://engity.com/meet/gnoczinski/ Mon, 01 Jan 0001 00:00:00 +0000 https://engity.com/meet/gnoczinski/ <div class="meet"> <iframe width="100%" height="1030" src="https://meet.brevo.com/engity-gn/borderless" referrerpolicy="no-referrer" ></iframe> <p class="fallback"> Unfortunately, a security setting in your browser is preventing the booking feature from being displayed here. Please use the following link to complete your booking: <a href="https://meet.brevo.com/engity-gn/" target="_self">Book now</a> </p> Privacy policy https://engity.com/data-privacy/ Mon, 01 Jan 0001 00:00:00 +0000 https://engity.com/data-privacy/ <h2 id="1-responsibility">1. Responsibility</h2> <p>The responsibility for data processing lies with:</p> <p>Engity GmbH<br> Lamontstr. 9<br> 81679 München / Munich, Germany<br> <a class="link regular" href="mailto:[email protected]" rel="nofollow">[email protected]</a></p>