{"id":593,"date":"2021-05-25T09:45:19","date_gmt":"2021-05-25T07:45:19","guid":{"rendered":"https:\/\/www.united-access.com\/?page_id=593"},"modified":"2025-02-17T12:57:23","modified_gmt":"2025-02-17T11:57:23","slug":"solutions","status":"publish","type":"page","link":"https:\/\/www.united-access.com\/de\/solutions\/","title":{"rendered":"L\u00f6sungen"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;Headerbild&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/04\/rendering-abstract-futuristic-background_web.jpg&#8221; height=&#8221;300px&#8221; border_width_bottom=&#8221;10px&#8221; border_color_bottom=&#8221;#C35C3A&#8221; global_module=&#8221;788&#8243; saved_tabs=&#8221;all&#8221; collapsed=&#8221;on&#8221;][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Seitentitel&#8221; module_class=&#8221;feldrechts&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; transform_translate_linked=&#8221;off&#8221; max_width=&#8221;750px&#8221; module_alignment=&#8221;right&#8221; hover_enabled=&#8221;0&#8243; global_module=&#8221;790&#8243; saved_tabs=&#8221;all&#8221; collapsed=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;produkte orange&#8221; _builder_version=&#8221;4.9.3&#8243; background_enable_color=&#8221;off&#8221; custom_margin=&#8221;20px||||false|false&#8221; custom_padding=&#8221;||80px||false|false&#8221;][et_pb_row column_structure=&#8221;1_6,1_6,1_6,1_6,1_6,1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/05\/Icons-22.png&#8221; alt=&#8221;logical access control&#8221; title_text=&#8221;Icons-22&#8243; url=&#8221;#logicalaccess&#8221; align=&#8221;center&#8221; admin_label=&#8221;logical access control image&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; saved_tabs=&#8221;all&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;logical access control text&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;#logicalaccess&#8221; saved_tabs=&#8221;all&#8221;]<\/p>\n<h4>Logical access control<\/h4>\n<p>Within the emerging market of IT-Security and the broad spectrum of security needs our products and services are focused on protecting the logical access to an IT infrastructure and secure data transfer.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web-49.png&#8221; alt=&#8221;physical access control&#8221; title_text=&#8221;Icons1-web-49&#8243; url=&#8221;#physicalaccess&#8221; align=&#8221;center&#8221; admin_label=&#8221;physical access control image&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;physical access control text&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;#physicalaccess&#8221; saved_tabs=&#8221;all&#8221;]<\/p>\n<h4>Physical access control<\/h4>\n<p>Physical access control is the classic way of protecting a building against non-authorised access at the outer shell of a building or at the border line of a campus.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web-50.png&#8221; alt=&#8221;personalisation&#8221; title_text=&#8221;Icons1-web-50&#8243; url=&#8221;#personalisation&#8221; align=&#8221;center&#8221; admin_label=&#8221;personalisation image&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;personalisation text&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;#personalisation&#8221; saved_tabs=&#8221;all&#8221;]<\/p>\n<h4>Personalisation<\/h4>\n<div class=\"et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Due to the different needs (technically and\u00a0 quantity wise) of customers United Access is operating a large number of personalisation systems with different configurations.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_6,1_6,1_6,1_6,1_6,1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web-52.png&#8221; alt=&#8221;mobile data collection&#8221; title_text=&#8221;Icons1-web-52&#8243; url=&#8221;#mobiledatacollection&#8221; align=&#8221;center&#8221; admin_label=&#8221;mobile data collection image&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;mobile data collection text&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;#mobiledatacollection&#8221; saved_tabs=&#8221;all&#8221;]<\/p>\n<h4>Mobile data collection<\/h4>\n<p>The unique identification of goods of all kinds is becoming more and more important due to increasingly complex logistics processes.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web-51.png&#8221; alt=&#8221;harddisc encryption &#8221; title_text=&#8221;Icons1-web-51&#8243; url=&#8221;https:\/\/www.united-access.com\/products-services\/#harddiscencryption&#8221; align=&#8221;center&#8221; admin_label=&#8221;harddisc encryption image&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; global_module=&#8221;1541&#8243; saved_tabs=&#8221;all&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;harddisc encryption text&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;#harddiscencryption&#8221; global_module=&#8221;1549&#8243; saved_tabs=&#8221;all&#8221;]<\/p>\n<h4>Harddisc encryption<\/h4>\n<p>High requirements are placed on these data storage media to protect against spying, illegal copying and modification<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web.png&#8221; alt=&#8221;cloud encryption &#8221; title_text=&#8221;Icons1-web&#8221; url=&#8221;https:\/\/www.united-access.com\/products-services\/#cloudencryption&#8221; align=&#8221;center&#8221; admin_label=&#8221;cloud encryption image&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; global_module=&#8221;1551&#8243; saved_tabs=&#8221;all&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_6&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;cloud encryption text&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;#cloudencryption&#8221; global_module=&#8221;1553&#8243; saved_tabs=&#8221;all&#8221;]<\/p>\n<h4>Cloud encryption<\/h4>\n<p>Protection against illegal spying and disclosure to third parties, as well as the protection against data loss<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Logical access control&#8221; module_class=&#8221;bereiche&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;0px|-110px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h2><div id=\"logicalaccess\"><\/div>Logical access control<\/h2>\n<p>Within the emerging market of IT-Security and the broad spectrum of security needs our products and services are focused on protecting the logical access to an IT infrastructure and secure data transfer.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#000027&#8243; divider_weight=&#8221;1px&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>In order to provide solutions for this market our product portfolio offers entry level as well as high end solutions. On entry level standard RFID media like Mifare can be used to protect the logon process to a Windows based PC. On high end level a\u00a0<a href=\"https:\/\/www.united-access.com\/products-services\/smart-cards\/\" target=\"_blank\" rel=\"noopener\">smart card<\/a>\u00a0can be used for high secure logon based on a Public Key Infrastructure (PKI \/ Kerberos) combined with email encryption and signature. Very often the logical access protection is combined with physical access control on media level by using hybrid cards (combining different chip technologies within one card or token) or multi-application cards (several applications on one chip).<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/05\/Icons-32.png&#8221; alt=&#8221;logical access control&#8221; title_text=&#8221;Icons-32&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Physical access control&#8221; module_class=&#8221;bereiche&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;0px|-110px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h2><div id=\"physicalaccess\"><\/div>Physical access control<\/h2>\n<p>Physical access control is the classic way of protecting a building against non-authorised access at the outer shell of a building or at the border line of a campus. This physical access control is handled by automated systems verifying RFID based id-tokens. Older generations of such systems are based on so called white list verifications using the unique id of the embedded\u00a0<a href=\"https:\/\/www.united-access.com\/products-services\/rfid-nfc\/\" target=\"_blank\" rel=\"noopener\">RFID chips<\/a>. Due to new technologies used by attackers more and more systems are migrated to high secure RFID products based on high end cryptographic methods. In order to prepare convenient solutions for the end users very often such physical access media are combined with\u00a0<a href=\"https:\/\/www.united-access.com\/solutions\/#logicalaccess\" target=\"_blank\" rel=\"noopener\">logical access<\/a>\u00a0functionality like in hybrid media (combining different chips within one media) or multi applications media (representing several logical applications on one chip).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#000027&#8243; divider_weight=&#8221;1px&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>United Access is focused on providing such high end products personalised in accordance to customer needs. Personalisation means printing of cards or tokens as well as encoding of the integrated RFID chips. Handling and maintaining cryptographic elements for our customers is our daily business. Furthermore United Access offers a broad portfolio of high quality card printing and encoding devices in order to enable the customer for self enrolment of access credentials. Additionally we also offer personalisation software incorporating as well the printing and the encoding of\u00a0<a href=\"https:\/\/www.united-access.com\/products-services\/rfid-nfc\/\" target=\"_blank\" rel=\"noopener\">RFID<\/a>\u00a0and smart cards.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web-49.png&#8221; alt=&#8221;physical access control&#8221; title_text=&#8221;Icons1-web-49&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Personalisation &#8221; module_class=&#8221;bereiche&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;0px|-110px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h2><div id=\"personalisation\"><\/div>Personalisation<\/h2>\n<p>Card personalisation covers as well the printing of the card as the encoding of the integrated chip(s). The encoding of the embedded chip includes the initialisation of the chip, the loading of the individual &#8211; in most of the cases personal data &#8211; and the installation of programms (e.g. JavaCard applets or patches). In order to guarantee data consistency the printing and encoding is handled within one integrated process. Due to the different needs (technically and\u00a0 quantity wise) of customers United Access is operating a large number of personalisation systems with different configurations.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#000027&#8243; divider_weight=&#8221;1px&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>As a special service United Access is able to personalise hybrid cards combining different technologies like contact based chips, RFID chips and magstripes within one process by flexible configuration of the personalisation environment. RFID chips of different frequency bands from 125kHz\u00a0 to 13,56MHz up to UHF are supported. Especially for the European market United Access is also providing personalisation services for the LEGIC technology (PRIME and Advant, unsegmented PRIME256).<\/p>\n<p>Since these services have to be configured case by case it would be a pleasure for us to provide an individual offer &#8211;\u00a0<a href=\"https:\/\/www.united-access.com\/contact\/\" target=\"_blank\" rel=\"noopener\">please contact us<\/a>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web-55.png&#8221; alt=&#8221;personalisation &#8211; access control&#8221; title_text=&#8221;Icons1-web-55&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Mobile data collection&#8221; module_class=&#8221;bereiche&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;0px|-110px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h2><div id=\"mobiledatacollection\"><\/div>Mobile data collection<\/h2>\n<p>The unique identification of goods of all kinds is becoming more and more important due to increasingly complex logistics processes. Previously, this was usually mapped using optical IDs in the form of barcodes or QR codes. Here, too, RFID technology is becoming more and more important, as it can be used at the same time as a secure protection against illegal cloning of products with simultaneous optimization of logistics processes through increased reading distances.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#000027&#8243; divider_weight=&#8221;1px&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>To support this trend, we offer products from our partner Datatronic Kodiertechnik GmbH in our portfolio. The TagTrans product family offers readers for all common frequency bands from 125kHz LF to 13.56MHz HF up to 868 &#8211; 926MHz UHF. In terms of the migration from optical IDs to secure RFID tags, these devices can also be equipped with barcode and QR code scanners and are therefore perfectly suitable for hybrid applications or migration scenarios. For use in potentially explosive environments, some of these devices are also available with an ATEX certificate. The reader is connected to a host system via industrial Bluetooth with ranges of up to 100m.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web-52.png&#8221; alt=&#8221;mobile data collection &#8211; access control&#8221; title_text=&#8221;Icons1-web-52&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Harddisc encryption&#8221; module_class=&#8221;bereiche&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; global_module=&#8221;1506&#8243; saved_tabs=&#8221;all&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;0px|-110px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h2><div id=\"harddiscencryption\"><\/div>Harddisc encryption<\/h2>\n<p>Despite increasing availability of cloud storage offerings, external hard drives are very often used to save data or as a transfer medium for sensitive data. Since both areas of application are mostly sensitive data &#8211; be it company data or personal data &#8211; high requirements are placed on these data storage media to protect against spying, illegal copying and modification. A good way to counter this is to use secure symmetrical and asymmetrical cryptographic methods.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#000027&#8243; divider_weight=&#8221;1px&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>Our product portfolio includes external storage media that make use of proven and disclosed cryptographic procedures and, depending on the application and the desired storage size, are designed as USB sticks or external hard drives in the terabyte range and offer additionally protection via chip cards. We use the products of a partner company with whom we have been working successfully for many years &#8211; the products of Digittrade GmbH from Germany.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web-56.png&#8221; alt=&#8221;harddisc encryption &#8211; access control&#8221; title_text=&#8221;Icons1-web-56&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Cloud encryption&#8221; module_class=&#8221;bereiche&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; global_module=&#8221;1508&#8243; saved_tabs=&#8221;all&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; transform_translate=&#8221;0px|-110px&#8221; transform_translate_linked=&#8221;off&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h2><div id=\"cloudencryption\"><\/div>Cloud encryption<\/h2>\n<p>Saving data in the cloud is very popular and easy, but very often a very reduced protection of this data is accepted. This concerns both the protection against illegal spying and disclosure to third parties, as well as the protection against data loss. In addition, the automated analysis and indexing of all data in the cloud by the respective providers are somehow accepted. These aspects were the trigger to enter into a partnership with a young company &#8211; fragmentiX GmbH. This partnership ultimately resulted in United Access GmbH investing in fragmentiX GmbH. We were and are involved in both the development and testing of the products.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#000027&#8243; divider_weight=&#8221;1px&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>The implemented basic principle of the fragmentiX product line is a scalable fragmentation of the data to be stored with simultaneous information-theoretical secure encryption based on One Time Pad, which also offers security against attacks by quantum computers. This \u201cfragmentation\u201d and encryption of the data enables the data to be stored on multiple cloud services without the attack on a single fragment leading to illegal spying or analysis. In order to be protected against the failure of several cloud providers, a redundancy level can be set for storage.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/07\/Icons1-web.png&#8221; alt=&#8221;cloud encryption &#8211; access control&#8221; title_text=&#8221;Icons1-web&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; module_class=&#8221;footer&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#eeeeee&#8221; global_module=&#8221;343&#8243; saved_tabs=&#8221;all&#8221; collapsed=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_4,1_2,1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/www.united-access.com\/wp-content\/uploads\/2021\/04\/logo-blue-transp_0.png&#8221; title_text=&#8221;logo-blue-transp_0&#8243; align=&#8221;right&#8221; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p style=\"text-align: center;\">Technopark 1C, A-3430 Tulln, Austria<br \/>phone: <a href=\"tel:0043227264123\">+43 (0) 22 72\/ 64 123<\/a><br \/>fax: +43 (0) 22 72\/ 65 124<br \/><a href=\"mailto:austria@united-access.com\">austria@united-access.com<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.10&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p><a href=\"https:\/\/www.united-access.com\/contact\/\">CONTACT<\/a><br \/><a href=\"https:\/\/www.united-access.com\/contact\/imprint\/\">IMPRINT<\/a><br \/><a href=\"https:\/\/www.united-access.com\/shop\/terms-conditions\/\">TERMS &amp; CONDITIONS<\/a><br \/><a href=\"https:\/\/www.united-access.com\/contact\/data-policy\/\">DATA POLICY<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Logical access control Within the emerging market of IT-Security and the broad spectrum of security needs our products and services are focused on protecting the logical access to an IT infrastructure and secure data transfer.Physical access control Physical access control is the classic way of protecting a building against non-authorised access at the outer shell [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-593","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.united-access.com\/de\/wp-json\/wp\/v2\/pages\/593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.united-access.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.united-access.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.united-access.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.united-access.com\/de\/wp-json\/wp\/v2\/comments?post=593"}],"version-history":[{"count":0,"href":"https:\/\/www.united-access.com\/de\/wp-json\/wp\/v2\/pages\/593\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.united-access.com\/de\/wp-json\/wp\/v2\/media?parent=593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}