Experience IT security up close – at it-sa in Nuremberg

Experience our IT solutions for data security and access protection live and to touch.

Artikelbild it-sa 2021: IT-Security hautnah erleben

Chemnitz, 29.09.2021

Artikelbild it-sa 2021: IT-Security hautnah erleben

it-sa is Europe’s largest trade fair for IT security and one of the most important platforms for solutions in the areas of cloud management, mobile and cybersecurity as well as data and network security worldwide. As a manufacturer of IT security solutions, digitronic cannot be missing!

Visit us from October 12 to 14 at our booth no. 7-312 in hall 7. Try out our 2-factor authentication SmartLogon™ for logging on to operating systems and specialist applications yourself. Test how easy it is to log in using a smartphone as a virtual token.

We are already looking forward to your visit! If you would like to make an appointment in advance, please write to us at vertrieb@digitronic.net. We will be happy to send you a free ticket for your visit to the trade fair.

These articles may interest you:

Pleasure instead of frustration when authenticating with SmartLogon™ from digitronic

digitronic offers a secure and convenient solution for 2-factor authentication with SmartLogon™.

Grafik SmartLogon

Chemnitz, 08.09.2021

Titelbild SmartLogon

Strong passwords prevent unauthorized persons or hackers from accessing sensitive data. At the same time, such passwords are not easy to remember, multiple mistyping triggers support – so their use is quite time-consuming and frustrating. SmartLogon™ from digitronic is a solution for 2-factor authentication that is as secure as it is simple and can be used in just a few minutes. Users log in here particularly conveniently with a short, easy-to-remember PIN and a security token; if the token is removed, the device locks itself automatically.

Complicated passwords were yesterday

“Thanks to SmartLogon™, complicated passwords are a thing of the past and security is significantly increased,” says Matthias Kirchhoff, Managing Director of digitronic computersysteme gmbh. The client-based 2-factor authentication replaces the Windows PC login on the computers that are to be protected.

At the same time, SmartLogon™ is more than just an authentication solution. The smart software supports various tokens and can be easily integrated into other systems – such as time and attendance or access control systems. Possible tokens include smartcards, USB or Bluetooth tokens, transponders and smartphones. The solution is installed, configured and rolled out centrally to multiple workstations in a matter of minutes. Only minimal administrative effort is required for everything.

Secure access, no matter when or where

“With SmartLogon™, employees can connect via remote desktop from any workstation using their credentials.” This also makes it easy to switch devices and securely access the terminal server from anywhere. In addition, the solution is multi-account capable. By integrating a KeePass plugin, users also get secure SSO for local installations and web portals. The token can also be used to launch personalized individual programs on shared computers.

SmartLogon™ from digitronic can be tested free of charge for 30 days. The hardware for this (SmartCard, reader, etc.) is provided on loan if necessary.

Individual consultation under +49 371 81539-0 or vertrieb@digitronic.net

These articles may interest you:

digitronic is technology partner of HID Global

Chemnitz, 26.08.2021

For a long time, we at digitronic have relied on HID Global hardware in conjunction with our security software for 2-factor authentication and network drive encryption. With the help of the HID RFID readers, for example, strong authentication on the operating system is realized via two factors in conjunction with the SmartLogon™ software.

Together even stronger
HID Global is the global hardware provider for access protection and secure identities. We are pleased that we are now also officially registered as a technology partner with HID Global and can thus be even closer to the latest developments. We will of course pass on the knowledge gained from this partnership to you and will be happy to advise you on the various options for implementing secure 2-factor authentication. Just get in touch with us.

You can find an overview of all our technology and sales partners here.

These articles may interest you:

Encryption as a central component of IT security

All too often, the topic of encryption of sensitive data in companies is not or not sufficiently highlighted. Yet data encryption is an important component for establishing confidentiality and the common Windows tools are usually not sufficient to establish adequate protection.

Bild Der verschwundene Tresor

Chemnitz, 20.07.2021

Bild Verschlüsselung als zentraler Bestandteil der IT-Security

Reliable data encryption is more important today than ever before. Especially when teams have to work on highly confidential data in a decentralized manner or across national borders. The increasing outsourcing of work to the home office also makes a rethink of the security structure in companies quite sensible.

In the following, we will look at what is actually meant by confidential data, why simple password protection for confidential files and folders is not enough, what the disadvantages of data encryption with Windows on-board tools are, and what alternatives there are to Windows tools.

What is confidential data anyway?

Basically, confidential data is any information that requires special protection and should not fall into the wrong hands. Here it is important for companies to consider two main aspects: The legal and the economic aspect. From a legal perspective, since the enforcement of the General Data Protection Regulation (GDPR), all personal data is particularly worthy of protection. This means that all employee and customer data must be protected from misuse by law, otherwise there is a risk of high financial penalties.

In purely economic terms, however, there is a great deal of other data that requires special protection because it secures a competitive advantage for the company or contains sensitive company internals, such as:

  • Research and development data
    Grafik Hackerangriff
  • Prototype data
  • construction plans
  • strategic documents
  • Project data
  • Calculations
  • transaction data
  • protocols
  • memos
  • and much more

If confidential information is not adequately protected, in the worst case scenario it can be tapped by hackers – or just as bad, by unauthorized people internally – and fall into the wrong hands.

Password protection for files and folders not secure enough and there is a risk of data loss

Screenshot Arbeitsmappe schützen WindowsIn some companies, confidential information is therefore at least password protected. In the individual Windows applications, this option is usually found under the menu item “File” -> “Information” -> “Protect workbook / document”. However, this protection is very insecure, not very practical and if used incorrectly, there is a risk of data loss, because:

  • Mostly all documents are protected with one and the same password
  • If the password is too simple, it can be easily hacked
  • If the password is too complicated, it can be quickly forgotten and you can no longer open the file

Data encryption with Windows on-board tools not consistent enough

Windows therefore brings yet another way to protect sensitive
Screenshot Verschlüsseln mit Windows-Boardmittelninformation from unauthorized access:

By right-clicking on the corresponding file/folder, you can access the “Attributes” area in the “General” tab via the properties and select the desired compression and encryption attributes there by clicking on the “Advanced” button.

Unfortunately, however, even this variant of data encryption is not consistent enough and bears the risk of data loss, because:

  • The generated key is attached to the account ID of your Windows user account, i.e. the file is encrypted only if you open it from another user account
  • If a hacker (or an unauthorized employee) logs in with your user account, he sees the file in plain text
  • When deleting the user account, the access to the protected files is irrevocably lost, if you have not exported the certificate first

Additional tool for the production of confidentiality

That’s why you can’t avoid using additional tools to adequately protect sensitive information. With the HiCrypt™ encryption solution, for example, you can ensure that only a selected group of people has access to certain data – and that is decoupled from the Windows user profiles. In doing so, HiCrypt™ fully integrates with your familiar Explorer view and runs as an additional network drive alongside your existing ones. By storing data in the HiCrypt™ network drive, the data is automatically encrypted. Access to the protected files is possible from anywhere and in a team. Authorization to view file contents is individually configurable and centrally manageable. Absolutely unique is the clear separation of powers in HiCrypt™ through decoupled access rights. This means that administrators can prepare the drives for encryption, but have no authorization to view the data. This protects them in case of suspicion.

Grafik Funktionsweise HiCrypt
Funktionsweise HiCrypt™

The software is installed in just a few minutes and runs silently in the background. HiCrypt™ is available in the versions “Professional” and “Enterprise Services”. Try HiCrypt™ Professional conveniently for 30 days free of charge or download the fact sheet with further technical information.

These articles may interest you:

We were at the GISEC 2021 in Dubai

GISEC 2021 live

Chemnitz, 08.06.2021

GISEC 2021 live
Lukas & Matthias Kirchhoff, digitronic computersysteme gmbh

The Gulf Information Security Expo and Conference (GISEC) is the largest cybersecurity forum in the Gulf region and is held annually at the Dubai World Trade Centre. Together with the two parallel events IoTX and Future Blockchain Summit, it forms Future Technology Week, which is expected to attract around 12,000 visitors.

GISEC offers security professionals from around the world the opportunity to find innovative solutions, share insights with industry experts, and equip themselves with the right tools to protect their businesses from ever-increasing cyber attacks.

We were a part of it last week from May 31 to June 2 and presented our IT security solutions made in Germany at the German Pavilion booth no. SS3-B10-5:

  • SmartLogon™: The convenient and secure way of authentication
  • HiCrypt™: The new generation of data encryption
  • SmartToken: Virtual security token for your smartphone

It was a great time. Many thanks to IT Security Association Germany (TeleTrusT) for organizing the joint booth and thanks to all visitors of our booth for the exciting conversations. We are already looking forward to the next time.

Impressions GISEC 2021

These articles may interest you:

Work even more flexibly now with new SmartLogon™ release

Your company has various branch offices with their own domains and you want your employees to be able to log in as far as possible everywhere with a uniformly secure and convenient 2-factor authentication? No problem with the release of the new SmartLogon™ version.

Bild SmartLogon Vertrauensstellung Domains

Chemnitz, den 16.04.2021

Bild SmartLogon Vertrauensstellung Domains

With the release of the new SmartLogon™ version, domains that are in a position of trust with others are supported. Thus, even in highly complex IT infrastructures, it is possible to implement logon processes with our convenient 2-factor authentication solution.

Employees at different branch offices with different domains can now use SmartLogon™ to log on securely and conveniently to the operating system or other applications at all (or selected) branch offices – even with offline cached profiles.

Put an end to password frustration when logging in

Strong passwords make it hard for hackers, but create frustration for users and support overhead if mistyped multiple times. SmartLogon™ cleverly solves these problems and ensures fast, secure and convenient logon to endpoints. User login is implemented with two factors: Something you know (short PIN) and something you have (security token). The installation as well as the central rollout to several workstations is done in a few minutes. Integrated session monitoring ensures that device access is blocked as soon as the security token is no longer connected (because the employee has moved away from the device, for example).

Suitable tokens include smartcards, transponders, USB or Bluetooth tokens, and smartphones. Often, existing hardware for e.g. locking systems or time recording systems can also be used. The possibilities here are almost unlimited.

The many additional features of the software – such as KeePass plugin, personalized interface for kiosk PCs or logging function – cover almost every use case in practice and make the solution more than just a secure logon solution.

These articles may interest you:

New base technology for HiCrypt™

Neue Basistechnologie für HiCrypt

Chemnitz, den 02.03.2021

Neue Basistechnologie für HiCrypt

HiCrypt™ encrypts data on network drives and ensures that only the group of people in possession of the corresponding key can view the confidential data.

With the new release from January 29 of this year, we have, among other things, integrated a completely newly developed filter driver. This renewal of the basic technology enables us to make further developments even faster and more flexibly in the future and to meet customer-specific requirements even better. HiCrypt™ thus takes the pulse of the times and is ideally equipped for the future.

With the next product release, initial encryption will also be available. This will make it possible to encrypt network drives that have already been filled.

Learn more about our HiCrypt™ encryption solution.

All product releases and the possibility of a test download can be found here.

These articles may interest you:

Instant technical solution for vaccination centers and health offices

Vaccination centers are currently facing a variety of challenges. We provide support to ensure IT security. Even when things have to happen quickly.

Gefahren im Gesundheitswesen

Chemnitz, den 23.02.2021

Gefahren im Gesundheitswesen

Many vaccination centers are currently faced with the challenge that, due to rotating staff and changing access to workstation PCs, changes to patient or contact person data can be difficult to track. If detailed logging of all processes does take place, then this is usually only possible with a great deal of effort. And especially now, when every second of staff time counts.

Together with our customers in the medical sector, we have therefore developed an instant technical solution that reliably protects confidential patient data, enables employees to log on and off PCs quickly and easily, and ensures the necessary transparency. The solution can be implemented at any number of workstations with little effort and, if necessary, adapted to your individual requirements.

Possible practical scenario:



Employees log on to the PC with an authentication feature (token, e.g. card or chip) and a short PIN. There is no need to enter complex passwords.


The user data is already read in the background during the login process. Depending on the user profile, other applications can be started in addition to Windows authentication.


Each logon process is now logged on the PC and assigned to the corresponding user via the token ID. This means that it is possible at any time to trace who worked on which system and when.


When the token is removed, the PC is automatically locked, the user is logged off, and the logoff process is noted in the log.

We would be happy to discuss with you how a concrete implementation can look for you. Simply arrange a telephone or video conference appointment with our sales team by calling +49 371 81539-0 or sending an e-mail to sales@digitronic.net.

These articles may interest you:

digitronic is DCS Awards Winner

We did it! Our encryption solution HiCrypt™ Enterprise Services has won the DCS Award 2020 in the category “ICT Security Product of the Year”.

Bild DCS Awards Gewinner

Chemnitz, den 11.12.2020

Artikelbild DCS Awards Gewinner

The DCS Award recognizes the achievements of providers and their business partners alike, and this year includes a broader range of categories for both infrastructure and information technology, designed to cover all major areas of the data center market in Europe.

What makes HiCrypt™ Enterprise Services different?

HiCrypt™ Enterprise Services enables centralized management of all encrypted shares, yet securely and reliably separates the different phases of the encryption process and responsibilities. The solution can also be conveniently connected to existing user administrations – without media disruption. Workflog integration as well as script-based control is also possible. The software is fully scalable and can therefore be flexibly deployed in any company or group structure.

HiCrypt™ Enterprise Services shows that digitalization, globalization and CLOUD do not necessarily lead to a loss of control over confidential data content and also protects IT administrators in case of suspicion. We thank all hardworking voters!

These articles may interest you: