Sagiton
Business Oriented Software House

Cybersecurity

SECURED SOFTWARE DEVELOPMENT

Cybersecurity
1

Identity and access management / SSO

ONE ACCOUNT ACROSS DIFFERENT APPS

Identity and access management / SSO - ONE ACCOUNT ACROSS DIFFERENT APPS

Increase the comfort of your users while maintaining a high level of security thanks to Single Sign On (SSO) and Federated Identity (e.g. logging via Facebook, LinkedIn, Google). Moreover, to take control of who, where and when has access to which data, introduce Identity and Access Management(IAM) solutions such as Gluu of which Sagiton is an official technology partner.

2

MultiFactor authentication

WHEN THE USERNAME AND PASSWORD ARE NOT ENOUGH

MultiFactor authentication - WHEN THE USERNAME AND PASSWORD ARE NOT ENOUGH

Better protect your application not only via standard and easy to capture login and password, but mainly through such elements as fingerprints, retinal scans, Time-based One Time Passwords valid for a short time and delivered via SMS/token, or physical keys.

3

Continuous security check

Secured software version upgrades

Continuous security check - Secured software version upgrades

Connect your IT system to Lemlock Scanner continuous security monitoring, which is a proprietary solution of Sagiton that increases the security of IT systems and applications by performing automated vulnerability scans of your software. Such a scan is performed each time before releasing a new version of your application.

4

Security and GDPR audits

Software Pentesting

Security and GDPR audits - Software Pentesting

Thanks to security audits (pentests) of your application you will find out if there are any security vulnerabilities that need to be addressed. Moreover technical GDPR audits tell you whether personal data in your system are being handled properly.