Industry-specific ProID solutions

Compliance with NIS 2, eIDAS, TISAX or ISO 27001

Our technologies help you meet industry standards and guidelines
Learn more

Technical solutions for industry standards, directives and decrees

streamline-icon-laptop-lock@140x140

Access protection

Secure, encrypted login to systems and computers with two-factor authentication tools.

ico-lock-network-95df5ec9i7pw9julw3hfpd

Cryptography

Encrypt electronic documents with private keys and electronic signatures.

streamline-icon-browser-page-hierarchy@140x140

Check

Manage users and their permissions with user certificates and lifecycle management modules.

Mandatory legislation for higher cybersecurity

Many industries are subject to specific standards and directives, which must be met for operating in the segment. We offer a technical solution to help you meet these obligations.

TISAX

The TISAX industry standard applies to the automotive industry. The aim is to ensure safe work with information and its transmission. Our solutions meet the requirements for the highest level of security in a number of ways.

European Directive NIS 2

A new EU cybersecurity strategy. In the Czech Republic alone, it includes over 6,000 companies and organizations. It mandates the mandatory introduction of encryption within organizations and two-factor authentication.

European eIDAS Directive

Defines the rules for working with electronic signatures. Our solutions are listed on the European trust list of certified instruments for the highest level of signature and seal (“qualified” level).

Cyber Security Act and ISO 27001

They apply to organizations falling under critical infrastructure elements and many others. They, too, require the introduction of two-factor authentication into an organization’s systems and computers.

Secure digital identity for employees

A secure work identity is the foundation of the ProID solution. Thanks to two-factor authentication and user certificates, only securely identified and authenticated users have access to corporate systems. User accounts are created only by responsible administrators. The creation of user accounts is always subject to the approval process and in the event of an employee’s departure, his accounts are deactivated.
ProID tools also support secure encryption of sent documents or logins to systems (e.g. encrypted login to VPN).

Contact us

Access Management – assignment and management of access rights

Access rights management in ProID is provided by both authentication tools (smart cards, mobile applications, bittron) and add-on modules for managing the life cycle of these permissions and certificates.

In the ProID platform, a trained person manages users’ access rights using add-on applications. Access rights based on certificates are checked regularly. In addition, logins to systems and devices are encrypted.

Contact us

Our projects

Are you interested in our solution? Contact us


    [honeypot honeypot-453]

    By filling in the form you agree to the processing of your personal data.