Security - AXM Plus

Can data be manipulated or copied?

No. In addition to the components already mentioned, we also use random number series (what are known as counters), which are attached to each data package once during each transfer. Subsequent transmission with manipulated or copied data will feature the wrong counter and the data is unusable.

Each component represents a high level of security and thus protects our data reliably, sustainably and redundantly.

How do I make sure that the person I invited actually gets the AX2Go key? What happens if the email is intercepted or forwarded unnoticed?

To eliminate the risk of intercepted emails, it is advisable to send the invitation link from the AXM administration software via an end-to-end encrypted communication channel such as an encrypted email. To do this, select the invitation type QR Code and copy the generated dynamic link into your email program.

You can also send the invitation without authorisations for the time being and only add them at a later stage (when you know that the right user has received the invitation) via group or individual authorisations.