Cybersecurity

Secured software development

Cybersecurity
1

GDPR-compliant app development

Be sure that your applications are compliant with EU privacy law

GDPR-compliant app development - Be sure that your applications are compliant with EU privacy law
GDPREUData PrivacyProvisionsLemlock GDPR Certificate

Applications we create are adapted to the requirements of the General Data Protection Regulation (GDPR). A full compliance audit is carried out by our partner – Lemlock who also oversees our adaptation of necessary upgrades and later confirms its correctness by providing a GDPR compliance certificate for your application.

2

Federated Identity & Single Sign-On

Share one user account between different apps

Federated Identity & Single Sign-On - Share one user account between different apps
SSOSocial Media AccountsMulti Apps Accounts

A convenient IT ecosystem should not force users to register and authenticate themselves multiple times. Increase the comfort of your users while maintaining a high level of security of the platform and applications thanks to the use of solutions like Single Sign On (SSO) and Federated Identity (e.g. logging via Facebook, LinkedIn, Xing, Google+).

3

Multi-factor authentication

When the username and password are not enough

Multi-factor authentication - When the username and password are not enough
OTPTOPTYubikeySMSTokenBiometric

Let your application verify users not only with the standard and easy to capture login or password, but mainly through such elements as fingerprints, retinal scans, Time-based One Time Passwords valid for a short time and delivered via SMS/token, or physical keys (e.g. Yubikey).

Thanks to this approach, you can give your user not only more freedom, but also the confidence that the data will not fall into the wrong hands.

4

Identity and Access Management

Introduce a strong and reliable access control to protect your services

Identity and Access Management - Introduce a strong and reliable access control to protect your services
User ManagementPrivilegesPermissionsRolesSecurity PoliciesCentral ManagementMulti App ConnectionIAM

Take control of who, where and when has access to which data, by implementing solutions based on identity management and data access (Identity and Access Management, IAM) software, e.g. Gluu Server of which Sagiton is an official technology partner.

5

App Data Protection

Make personal data unreadable for anyone except you

App Data Protection - Make personal data unreadable for anyone except you
AnonymizationPseudonymizationMinimizationTokenizationEncryptionHashingData Reduction

While creating an application, we always keep in mind the safety of your users and their data. That is why your application – if necessary – will be equipped with solutions like pseudonymization, anonymization and minimization which significantly decrease the possibility of stealing important information, even if someone is able to infiltrate your system.

7

App Security Audits

Be sure that your project is secure

App Security Audits - Be sure that your project is secure
White BoxBlack BoxVulnerability CorrectionLemlock Standard Certificate

Security of your application will be verified by our partner – Lemlock. Then, after obtaining the results from the conducted penetration tests and security audit, we will introduce appropriate security mechanisms. The solution delivered by us will meet all security standards applicable at the time of testing and confirmed by the Lemlock App Secured Certificate.

Are you interested in comprehensive solutions tailored to your needs?