Because it's time to access the future.

intelligent and self-sufficient hardware that is inaccessible from the outside
In order for your time recording terminals and access readers to work according to the specifications that you store in the software, these two components must communicate with each other. Of course, this communication is reliably encrypted at all times. In addition, we have questioned and tested the security of our hardware in various scenarios and implemented a decisive mechanism that makes the hardware inaccessible to hacker attacks: the hardware registers with the software - without exception and never vice versa.
Das Muss für jedes sichere Cloudsystem
The hardware registers itself with the software - without exception and never vice versa
​Damit Ihre Zeiterfassungsterminals und Zutrittsleser entsprechend der Vorgaben arbeiten, die Sie in der Software hinterlegen, müssen diese beiden Komponenten miteinander kommunizieren. Diese Kommunikation ist selbstverständlich zu jedem Zeitpunkt zuverlässig verschlüsselt.
Zusätzlich haben wir die Sicherheit unserer Hardware in verschiedenen Szenarien hinterfragt, geprüft und einen entschiedenen Mechanismus implementiert, die die Hardware für Hackerangriffe unerreichbar macht: die Hardware meldet sich bei der Software an - ausnahmslos und niemals umgekehrt.
Szenario 1:
Scenario 1:
The hardware registers with the software for the first time
During commissioning, the hardware establishes a connection to the software for the first time, in that the hardware registers with the software in encrypted form. A connection is only established if the hardware serial number is stored in the software.
It is not technically possible to connect software to hardware
The hardware always logs on to the correct account
Scenario 2:
The hardware is connected to the software
Die Hardware ist mit der Software verbunden
If the hardware is connected to the software, there is an encrypted one-to-one connection. Another connection or tapping of the communication is not possible.
Szenario 3:
Scenario 3:
The connection between hardware and software is broken
If there is no active connection between hardware and software, eg due to a power failure, the hardware continues to work independently.
The hardware works independently and is not dependent on a permanent connection to the software
The hardware saves work data locally - encrypted, of course. The hardware works with these until new data is sent to the hardware
If there is no connection to the software, events are stored locally, encrypted of course, until the connection to the software can be reestablished
Szenario 4:
Scenario 4:
Someone is trying to access the hardware from outside while it is not connected to the nubicon software
If a connection is to be established, it must be initiated by the hardware without exception.
If software tries to register with the hardware, it will be rejected.
Our hardware has a proprietary operating system. The knowledge of how it works lies exclusively with us.
Noch Fragen?
nubicon develops location-independent operable time tracking and access control systems and combines security with flexibility. We bring more than 30 years of industry experience together with the latest knowledge of software development.
Ausführlich oder kurz und knapp - ganz, wie es in Ihren Terminkalender passt.