Reduce the risk of cyber attacks

Ongoing digitalization offers many positive opportunities. But where new opportunities arise, new dangers and risks are also on the horizon. Especially in connection with weak authentication methods, such as a username-password combination, serious IT security incidents can occur. 81% of all cyber attacks can be traced back to weak passwords or other insecure authentication methods. Damage caused by these attacks, especially if sensitive data - whether from companies, customers or citizens - is exposed, it is difficult to cope with.

Icon Mehrwert

Combining security with ease of use

With XignIn, we have developed a passwordless authentication technology that combines security with ease of use.

Icon Mehrwert

Reduce risk

By using state-of-the-art cryptographic methods and completely eliminating the use of passwords, our technology manages to enormously reduce the risk of a successful cyber-attack.

Icon Mehrwert

Increase security

By using our multifactor authentication and multiple login mechanisms, the security of data, networks, platforms and applications is increased.


Pioneering authentication for our everyday lives

Traditional authentication methods, such as the combination of username and password, are not solutions that can withstand the challenges of today and tomorrow and meet individual customer requirements. In many respects, a paradigm shift is required, which we are driving forward with our forward-looking authentication solution XignIn.

IT security expert sits at a table with three screens and checks the system

Highest IT security in the digital age

XignIn technology is based on a public key infrastructure and uses only state-of-the-art hash algorithms, encryption methods and protocols. Hardware Security Modules (HSM) are used to secure the cryptographic procedures. In the form of multifactor authentication, XignIn offers significant gains in security, speed and ease of use compared to conventional authentication solutions. The technology (Xign.Me, XignIn, FIDO2 server) is currently in the certification phase according to eIDAS security level "substantial" by the German Federal Office for Information Security (BSI).

Convenient security:

  • Secure data management in certified data centers (XignIn SaaS)
  • Access to manager interface strongly secured for both admins and normal users
  • Easy policy management by group or service
  • Lifecycle management for users and devices
  • Role-based access management
  • Encrypted databases
IT security expert sits at a table with three screens and checks the system
Man uses biometric sensors of his smartphone for login instead of using passwords
Man uses biometric sensors of his smartphone for login instead of using passwords

Password-free through everyday life - now and in the future

Despite serious risks and high economic disadvantages, passwords are traditionally still in widespread use. Not only companies and municipalities suffer from this, but also the end users. The authentication solution XignIn combines highest security with intuitive handling and therefore completely dispenses with passwords for good reasons. Instead, we rely on biometric features, strong cryptography and the use of hardware security modules (HSM). In this way, we also offer end-user:in a smooth and convenient login experience.


  • Improved user experience by ending password fatigue and frustration
  • Increase user productivity
  • Reduced administrative overhead: time and costs are saved, for example, through fewer help desk tickets and password resets
  • Effective protection against cyber attacks
Smart City

Application areas

Digitization creates new opportunities for efficiency gains, cost reductions, service improvements and sustainability in all areas! Each of these areas must be understood and served to achieve the big picture, the Smart City.

Smart City: The whole is greater than the sum of its parts

The term "Smart City" is just an empty phrase if the individual segments are considered separately and IoT / ICT systems and platforms do not communicate with each other. Unrestricted interoperability of the systems is essential so that operators and citizens can experience the added value of the smart city and the quality of life increases sustainably.

Discover Smart City
View from the street of a big city upwards to the big buildings

Smart Economy

Portals, platforms, building access, digital signatures
Uniform, secure and simple authentication of employees, partners and customers and protection of sensitive data.

Learn more
Wind turbine surrounded by clouds

Smart Energy and Environment

Customer management systems, smart metering, Internet of Things
Mastering the transformation to a digital application partner and strengthening the security of critical infrastructures.

Learn more