CAQ: INFORMATION SECURITY FOR NETWORKED PROCESSES
Digitally networked quality management processes offer companies enormous potential: simplified communication, faster data exchange, more efficient processing of collaborative processes. The direct integration of business partners into the companies’ own quality management processes is the next logical step. CASQ-it provides a method for secure networking along the value-added chain. Everyone, from external employees and merchants to customers and suppliers, uses browser access to work exclusively and directly in the CAQ system itself. In this way, CASQ-it meets one of the core requirements of the digital transformation: information security for sensitive business processes and data in the context of networking across businesses.
INFORMATION SECURITY IN ACCORDANCE WITH VDA ISA/TISAX
The foundation is the multi-stage architecture in CASQ-it. It is aligned with the VDA’s Information Security Assessment (VDA ISA), which ensures information security between networked companies in the automotive value-added chain.
Evidence of information security, such as that provided in the Trusted Information Security Assessment Exchange (TISAX) assessment and exchange mechanism, is increasingly becoming the basis for new and follow-up orders in the automotive industry. Therefore, companies that want to participate in the digital value-added chain over the long term need software with technology that is absolutely suitable for meeting the challenges of digitalization.
AVAILABILITY, CONFIDENTIALITY, AND INTEGRITY
When networking with CASQ-it, the owner of the CAQ systems always has control over the data, data transfer, and the depth of the networking. The owner determines who has access, what the networked person sees, and the ability of the person to take action within the CAQ system.
- Access monitoring: Even outside the CAQ system, the access monitoring requires unambiguous authentication and authorization.
- Explicit rights concept: Communication and data exchange take place according to a secure set of rules. CASQ-it monitoring ensures that work is done exclusively within these rights.
- Communication without third parties: Data exchange, whether its an assessment report or 8D report, is always carried out as end-to-end communication between the supplier and the customer – without data exchange via third parties or bridging solutions such as chats or external platforms.
- Encryption: Every communication step is encrypted with SSL/TLS. This protocol for securing internet connections and data transfers guarantees that only the participating companies can read and edit the content.
CONTROL 2019 – EASY. SECURE. NETWORKED.
On May 7-10, in Hall 8, Stand 8302 at the Control trade fair, we will show you how you can use CASQ-it to network efficiently with your business partners along the entire value-added chain, while retaining control over your data at all times.To make an appointment and reserve tickets