{"id":23650,"date":"2018-04-23T14:22:27","date_gmt":"2018-04-23T12:22:27","guid":{"rendered":"https:\/\/gis-consulting.de\/unsere-prinzipien\/"},"modified":"2023-06-10T17:39:08","modified_gmt":"2023-06-10T15:39:08","slug":"unsere-prinzipien","status":"publish","type":"page","link":"https:\/\/gis-consulting.de\/en\/unsere-prinzipien\/","title":{"rendered":"Our principles"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[mk_page_section bg_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2023\/01\/gis_prinzip-freiheit.png&#8221; bg_color=&#8221;#5b7e96&#8243; bg_position=&#8221;right center&#8221; bg_repeat=&#8221;no-repeat&#8221; min_height=&#8221;0&#8243; padding_top=&#8221;85&#8243; padding_bottom=&#8221;85&#8243; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_style=&#8221;curve-bottom&#8221; visibility=&#8221;hidden-sm&#8221; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider size=&#8221;120&#8243;]<div id=\"mtm-overlay-box-1\" class=\"mtm-overlay-box\"><div class=\"mtm-overlay-box-content-wrapper\"><h2 class=\"mtm-overlay-box-title\">Why ask. Why live. Establish rules. Know why.<\/h2><p class=\"mtm-overlay-box-content\"><\/p><\/div><\/div>[mk_padding_divider size=&#8221;50&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2023\/01\/gis_prinzip-freiheit.png&#8221; bg_color=&#8221;#5b7e96&#8243; bg_position=&#8221;right center&#8221; bg_repeat=&#8221;no-repeat&#8221; min_height=&#8221;0&#8243; padding_top=&#8221;85&#8243; padding_bottom=&#8221;85&#8243; bottom_shape_style=&#8221;curve-bottom&#8221; visibility=&#8221;visible-sm&#8221; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221;][vc_column][mk_padding_divider size=&#8221;120&#8243;]<div id=\"mtm-overlay-box-2\" class=\"mtm-overlay-box\"><div class=\"mtm-overlay-box-content-wrapper\"><h2 class=\"mtm-overlay-box-title\">Why ask. Why live. Establish rules. Know why.<\/h2><p class=\"mtm-overlay-box-content\"><\/p><\/div><\/div>[mk_padding_divider size=&#8221;80&#8243;][\/vc_column][\/mk_page_section][vc_row padding=&#8221;0&#8243; css=&#8221;.vc_custom_1674033141519{padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;][vc_column][mk_padding_divider size=&#8221;20&#8243;][vc_single_image image=&#8221;22523&#8243; img_size=&#8221;100&#215;100&#8243;][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221;]\n<h1 class=\"mk-color-layer\">Our principles<\/h1>\n[\/mk_fancy_title][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]\n<h2>That&#8217;s how we tick &#8211; what makes us tick is the constant question of WHY. Our principles offer you freedom and automation!<\/h2>\n[\/mk_fancy_title][\/vc_column][\/vc_row][vc_row id=&#8221;Automation&#8221;][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider size=&#8221;80&#8243;][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/automation-1.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;left-to-right&#8221; crop=&#8221;false&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]\n<p class=\"p1\">Rule-based automation<\/p>\n[\/mk_fancy_title][vc_column_text disable_pattern=&#8221;false&#8221; css=&#8221;.vc_custom_1551083756444{margin-bottom: 0px !important;}&#8221;]The day-to-day changes within companies are massive: employee entries and exits, changes of use, changes of tasks and functions, changes of departments and responsibilities as well as onboarding and offboarding processes of external parties happen several times a day. Legal and operational requirements, verification obligations and regulations are in constant flux. Systems and processes undergo constant adjustments. Keeping track of all these dynamic requirements is a challenge in itself &#8211; implementing and ensuring these reliably, accurately, error-free, up-to-date, audit-proof and traceable at every location and for every process operationally through manual administration and system maintenance is hardly possible.[\/vc_column_text][vc_column_text disable_pattern=&#8221;false&#8221; css=&#8221;.vc_custom_1551083766059{margin-bottom: 0px !important;}&#8221;]Based on these facts, .secure works with the principle of rule-based automation. This means: on the basis of a few and transparent rules, intelligent software agents implement the most diverse change requirements completely automatically in all connected systems on the basis of electronic processes. This is implemented reliably, completely, traceably and always in accordance with the operationally defined specifications. Thus, responsible persons can simply be sure &#8211; no matter what kind of changes take place per minute, hour or day &#8211; all systems work compliantly to the specifications &#8211; without even one system administrator having to take manual action.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083776001{margin-bottom: 0px !important;}&#8221;]This rule-based and automated execution of all processes results in no errors and the highest compliance and audit conformity can be ensured.[\/vc_column_text][\/vc_column][\/vc_row][vc_row id=&#8221;Freiheit&#8221;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]Freedom and independence[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551083850637{margin-bottom: 0px !important;}&#8221;]The freedom to choose at any time &#8211; to model and use the most suitable processes, systems or components at any time without any real restrictions &#8211; is another basic principle of gis GmbH software solutions. Closed&#8221; systems, proprietary protocols, or other artificial restrictions imposed by system vendors and solution providers can create dependency for customers.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083860607{margin-bottom: 0px !important;}&#8221;]The dynamics with regard to changes in the organizational and legal spheres, coupled with the development and use of innovative technologies and cross-company processes, leave no room for restrictions and artificial dependencies. An intelligent combination of proven systems and technologies, the mixing of a wide variety of manufacturer systems, and the use and barrier-free deployment of new processes, systems and components must be possible for agile companies at all times. To be able to adapt quickly, to change and take advantage of new opportunities, to map local as well as central requirements easily and immediately and to be prepared for the challenges of the future &#8211; this is what a platform offers that is very flexible, independent, standardizable, modern and modular.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083873212{margin-bottom: 0px !important;}&#8221;].secure offers exactly this functionality in its base. It offers manufacturer, system, technology and operating model independence. Freedom here means: no matter which manufacturers your access terminals are from, no matter which (access or administration) systems they work with, no matter whether you use mechanical systems, different RFID technologies or biometric processes &#8211; .secure can support and control exactly these mixed forms. Meanwhile, you even have the freedom to choose the operating models. It is almost irrelevant whether the system platform is operated in your own data center (OnPremise) or in a hosted third-party data center or even in modern cloud ecosystems available worldwide (OnDemand). The customers of .secure have the maximum freedom of choice.[\/vc_column_text][\/vc_column][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/freiheit-1.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;right-to-left&#8221;][\/vc_column][\/vc_row][vc_row id=&#8221;Life&#8221;][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider size=&#8221;80&#8243;][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/lifecycle-1.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;left-to-right&#8221; crop=&#8221;false&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]Life Cycle Management[\/mk_fancy_title][vc_column_text disable_pattern=&#8221;false&#8221; css=&#8221;.vc_custom_1551083885859{margin-bottom: 0px !important;}&#8221;]To operate the entirety of changes over a very long period of time with the highest reliability and complete up-to-dateness &#8211; this is what gis GmbH understands by Life Cycle Management &#8211; and this under many aspects. It&#8217;s not just the lifecycle of an employee, a device, a door or facility, an authorization policy, a legal requirement, an organizational restructuring, a technology change, a change of use of buildings and spaces, a process change. It is the, life cycle of a data set under the aspects of data protection, editing and visibility, changes of operator behavior &#8211; all these aspects require a very high flexibility in the area of definition of behavior and possibilities of parameterization of changes.[\/vc_column_text][vc_column_text disable_pattern=&#8221;false&#8221; css=&#8221;.vc_custom_1551083895677{margin-bottom: 0px !important;}&#8221;]The integration of life cycle management in .secure enables extremely flexible and automated handling of validities of individual data sets. This model is also available in the handling of interfaces and thus data records can be received from or transferred to subsystems before or after the actual validities.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083906929{margin-bottom: 0px !important;}&#8221;]By merging life cycle management and personal data records, the applications of gis GmbH make it possible to map the entire life cycle of a person, without gaps. By dividing the Life Cycle into PreActive, Active, InActive, and DeActive, a person can go through various changes such as change of department, sabbatical, etc., with only one record created and without creating multiple records on a person.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083917094{margin-bottom: 0px !important;}&#8221;].secure is equipped for this challenge on the basis of its basic architecture. New requirements can be seamlessly incorporated into the robust software models.[\/vc_column_text][\/vc_column][\/vc_row][vc_row id=&#8221;Browser&#8221;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]100% browser based[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551083926963{margin-bottom: 0px !important;}&#8221;]All gis GmbH applications are 100% browser-based, which means that they can be used without any installation on the individual workstations and with different browsers and operating systems, even with mobile devices. This means: maximum rollout speed, simplest user experience, familiar operating concepts, lowest life cycle costs, most flexible and minimal hardware requirements, simplest scalability, high variance and flexibility of the IT infrastructure, greatest possible freedom of operating models, fullest use of all modern integration technologies and simplest barrier-free administration &#8211; centrally, regionally and locally.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083937207{margin-bottom: 0px !important;}&#8221;]Full operation of all functions via a standard browser is possible without restrictions and without any software installation on users&#8217; computers and based on standard Microsoft backend technologies, even in current cloud environments. This means that even large and complex installations can be operationally deployed very quickly.[\/vc_column_text][\/vc_column][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/prinzipien_browserbasiert-1.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;right-to-left&#8221;][\/vc_column][\/vc_row][vc_row id=&#8221;Berechtigung&#8221;][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/berechtigungs_management_2.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;left-to-right&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]Authorization management[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551083947868{margin-bottom: 0px !important;}&#8221;]In addition to the basic operational processes of the application, the crucial linchpin is the control of authorizations. In your company, it is crucial to give employees the actual concrete permissions they are entitled to, based on their current task, position, role, competence, qualification or function, while denying all other permissions. In addition, evidence must be kept about it that can withstand any audit to a &#8220;click&#8221;.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083961317{margin-bottom: 0px !important;}&#8221;]Permissions are multi-layered in our context. For example, it may be free access to the workplace, use of the cafeteria for external parties, possession of a key to access the technical rooms, approval for a business process, and access to evaluations or access to a specific application in a specific role (such as being an absenteeism representative as a &#8220;team leader&#8221;). But it can also be the right to create an order process for an external service provider, to receive a report about visit processes, to have the possibility to use a parking lot and much more.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083972419{margin-bottom: 0px !important;}&#8221;]Based on a wide variety of parameters, rules and policies, this set of rules determines the provisioning (provisioning) of the currently defined and specified set of authorizations. It also determines the secure denial (deprovisioning) of all other unjustified and invalid authorizations, which is even more important. The determination of authorizations is a permanent process, which can change every second. The core task of the .secure authorization model is to automatically detect these changes, evaluate them and pass them on to all relevant systems and processes at a specific time of validity.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551083987567{margin-bottom: 0px !important;}&#8221;]This guarantees a process and system world that is 100% compliant with definitions, rules and policies, traceable and reliable &#8211; without any manual interaction and with the most up-to-date data.[\/vc_column_text][\/vc_column][\/vc_row][vc_row id=&#8221;IT&#8221;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]IT Security and Data Protection Compliance[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551084000291{margin-bottom: 0px !important;}&#8221;]For more than 25 years, the systems of gis GmbH have been processing highly sensitive personal data. We have been aware of the existential importance of IT security measures not only since the current discussion about the EU-DSGVO. The threat scenarios to IT systems are increasing &#8211; at the same time, the need to operationalize business processes across companies is growing. In .secure, a multitude of state-of-the-art, proven standard technologies are anchored to ensure IT security, data protection, privacy and data security &#8211; and that in operational as well as in modern cloud environments. In addition, the rule-based authorization management ensures that the very finely granulated authorizations take effect reliably and securely.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084015111{margin-bottom: 0px !important;}&#8221;]For more than 25 years, the systems of gis GmbH have been processing highly sensitive personal data. We have been aware of the existential importance of IT security measures not only since the current discussion about the EU-DSGVO. The threat scenarios to IT systems are increasing &#8211; at the same time, the need to operationalize business processes across companies is growing. In .secure, a multitude of state-of-the-art, proven standard technologies are anchored to ensure IT security, data protection, privacy and data security &#8211; and that in operational as well as in modern cloud environments. In addition, the rule-based authorization management ensures that the very finely granulated authorizations take effect reliably and securely.[\/vc_column_text][\/vc_column][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/it_security.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; animation=&#8221;right-to-left&#8221;][\/vc_column][\/vc_row][vc_row id=&#8221;System&#8221;][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/prozess_integration-1.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;left-to-right&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]System\/Process Integration &amp; Interfaces[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551084033470{margin-bottom: 0px !important;}&#8221;]secure is a platform that can be integrated to a high degree into existing ecosystems: it receives resilient data from controlling systems, processes it, consolidates it, connects it with its own (settings, rules, policies and other own data pools) and supplies subsystems with this data (uni- or bidirectionally). Using access control as an example, data could come from utility systems such as HR systems (SAP HCM\/OM), identity management systems, IT directories such as Microsoft Active Directory, or room data from facility management systems. The room or security zones are managed in .secure including the authorization parameters, as is the badge production. The corresponding authorizations are then sent from the .secure system to the access system(s) ,which in turn execute them for the &#8220;door open&#8221; decision. Booking data from high-security areas could be returned to .secure to be stored for 14 days as specified, while all other booking information could be deleted immediately.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084042961{margin-bottom: 0px !important;}&#8221;].secure supports a variety of standard technologies to exchange data with subsystems. The intelligent agents perform their activities according to defined patterns &#8211; time or event controlled or on-demand.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084057189{margin-bottom: 0px !important;}&#8221;]<strong>Integration<\/strong><\/p>\n<p>.secure can be integrated into all system environments and is implemented on the basis of proven Microsoft standard technologies (.NET). Existing Microsoft systems are also used. A wide range of interface technologies are implemented for communication with other systems. A major advantage is that all in-house work and approval processes can be mapped in .secure. The Microsoft Workflow Engine is used for this purpose.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084073085{margin-bottom: 0px !important;}&#8221;]<strong>Interfaces<\/strong><\/p>\n<p>Currently, we support many different manufacturer systems from the field of electronic access control that are connected to the platform .secure &#8211; and there are more and more! In addition, the software supports various RFID and biometric systems and controls online and offline, mechanical, mechatronic and depot systems. The combination of different access technologies or manufacturer systems &#8211; a big hurdle for most of our competitors &#8211; are typical use cases for us.[\/vc_column_text][\/vc_column][\/vc_row][vc_row id=&#8221;Self&#8221;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]Self Service &amp; Workflow Processes[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551084094273{margin-bottom: 0px !important;}&#8221;]The <strong>Self Services<\/strong> of the gis GmbH offer the users an independent, time as well as hardware-independent possibility to be able to accomplish processes independently and with minimum expenditure. Various parameterizable business processes are mapped on easy-to-use browser-based interfaces. Self-services extremely shorten process runtimes and save your employees the time they need for the really important things. Transparency is ensured by clearly showing which application is at which approval stage. By documenting the individual steps, it is possible to track at any time the status of the process and who, as the processor, initiated the corresponding steps and when.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084110653{margin-bottom: 0px !important;}&#8221;]Self services for employees are basic elements for fast and resilient business processes. The data there is captured where it is generated and routed directly and without media breaks through electronically mapped approval processes to the current approval points to provide immediate feedback &#8211; it doesn&#8217;t get any faster, more transparent or error-free than this.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084130043{margin-bottom: 0px !important;}&#8221;]The <strong>workflow processes<\/strong> enable the mapping of more or less complex work steps and decision points of a business process. In addition to the standard business processes, the .secure world offers the possibility of customer-specific extensions through customizing measures.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084142626{margin-bottom: 0px !important;}&#8221;]Within .secure, workflows are used, for example, to control applications or their approval process. The workflow processes are started depending on various parameters. These can be multi-level. Depending on the definition, the stored responsible persons are then informed when an application is submitted. As soon as a defined process step has been completed, the next one is automatically initiated by the system.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084152781{margin-bottom: 0px !important;}&#8221;]For the user and all those involved in the process, this means: extremely simple operation, immediate information and transparency, and no multiple entries. For process owners, this means high flexibility in modeling their business processes and maximum speed and integrity at minimum cost.[\/vc_column_text][\/vc_column][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/workflow.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;right-to-left&#8221;][\/vc_column][\/vc_row][vc_row id=&#8221;Transparenz&#8221;][vc_column visibility=&#8221;hidden-sm&#8221; width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_padding_divider][mk_image src=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/compliance.jpg&#8221; image_width=&#8221;500&#8243; image_height=&#8221;500&#8243; align=&#8221;center&#8221; animation=&#8221;left-to-right&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider][mk_padding_divider][mk_fancy_title color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]Transparency, auditing and compliance[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1551084166382{margin-bottom: 0px !important;}&#8221;]The software solutions of gis GmbH integrate the features of transparency, auditing and compliance down to the last detail.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084183223{margin-bottom: 0px !important;}&#8221;]<strong>Transparency<\/strong><br \/>\nWith the software solutions of gis GmbH, all processes are documented in detail so that maximum transparency can be offered to the users. Documentation in combination with individual authorization management ensures that data is made available to the right people and provides the best possible transparency within the respective authorization groups.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084198478{margin-bottom: 0px !important;}&#8221;]<strong>Revision<\/strong><br \/>\nDue to the application-oriented mode of operation of .secure, every change is checked and documented. This means that every change, e.g. of interfaces or user interfaces, is seamlessly registered and thus made traceable for internal and external audits at any time.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1551084211919{margin-bottom: 0px !important;}&#8221;]<strong>Compliance<\/strong><br \/>\nDue to the increasing number of standards, laws and regulations, it is becoming more and more difficult for companies to comply with the multitude of rules. The software solutions of gis GmbH help you to comply with, check and monitor both your internally defined specifications and the externally specified rules.[\/vc_column_text][\/vc_column][\/vc_row][vc_row padding=&#8221;0&#8243;][vc_column][vc_column_text]\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider size=&#8221;80&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1524054369438{margin-bottom: 0px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1526561254869{padding-right: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;link secure-visit&#8221;][mk_custom_box padding_vertical=&#8221;20&#8243; background_hov_color_style=&#8221;image&#8221; bg_hov_color=&#8221;#1379bf&#8221;][mk_icon_box2 icon_type=&#8221;image&#8221; icon_size=&#8221;48&#8243; icon_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/visit_rund_1_150_150_web-1.png&#8221; title=&#8221;Visitor management&#8221; title_size=&#8221;22&#8243; title_weight=&#8221;bold&#8221; title_bottom_padding=&#8221;0&#8243; align=&#8221;left&#8221;].VISIT[\/mk_icon_box2][\/mk_custom_box][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1526561262409{padding-right: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;link secure-access&#8221;][mk_custom_box padding_vertical=&#8221;20&#8243; background_hov_color_style=&#8221;image&#8221; bg_hov_color=&#8221;#b43b2c&#8221;][mk_icon_box2 icon_type=&#8221;image&#8221; icon_size=&#8221;48&#8243; icon_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/access_rund_150_150_web.png&#8221; title=&#8221;Access management&#8221; title_size=&#8221;22&#8243; title_weight=&#8221;bold&#8221; title_bottom_padding=&#8221;0&#8243; align=&#8221;left&#8221;].ACCESS[\/mk_icon_box2][\/mk_custom_box][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1526561294229{padding-right: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;link wtime-for-web&#8221;][mk_custom_box padding_vertical=&#8221;20&#8243; background_hov_color_style=&#8221;image&#8221; bg_hov_color=&#8221;#3f97b5&#8243;][mk_icon_box2 icon_type=&#8221;image&#8221; icon_size=&#8221;48&#8243; icon_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/wtime_rund_150_150__web.png&#8221; title=&#8221;Time Management&#8221; title_size=&#8221;22&#8243; title_weight=&#8221;bold&#8221; title_bottom_padding=&#8221;0&#8243; align=&#8221;left&#8221;].WTIME[\/mk_icon_box2][\/mk_custom_box][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1526561306620{padding-right: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;link secure-certify&#8221;][mk_custom_box padding_vertical=&#8221;20&#8243; background_hov_color_style=&#8221;image&#8221; bg_hov_color=&#8221;#05578c&#8221;][mk_icon_box2 icon_type=&#8221;image&#8221; icon_size=&#8221;48&#8243; icon_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/certify_rund_150_150_web.png&#8221; title=&#8221;Instruction Management&#8221; title_size=&#8221;22&#8243; title_weight=&#8221;bold&#8221; title_bottom_padding=&#8221;0&#8243; align=&#8221;left&#8221;].CERTIFY[\/mk_icon_box2][\/mk_custom_box][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1542031601495{padding-right: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;link secure-external-fremdfirmenverwaltung&#8221;][mk_custom_box padding_vertical=&#8221;20&#8243; background_hov_color_style=&#8221;image&#8221; bg_hov_color=&#8221;#6b6988&#8243;][mk_icon_box2 icon_type=&#8221;image&#8221; icon_size=&#8221;48&#8243; icon_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/external_rund_150_150_web.png&#8221; title=&#8221;Contractor management&#8221; title_size=&#8221;22&#8243; title_weight=&#8221;bold&#8221; title_bottom_padding=&#8221;0&#8243; align=&#8221;left&#8221;].EXTERNAL[\/mk_icon_box2][\/mk_custom_box][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1526561335501{padding-right: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;link secure-portal&#8221;][mk_custom_box padding_vertical=&#8221;20&#8243; background_hov_color_style=&#8221;image&#8221; bg_hov_color=&#8221;#269599&#8243;][mk_icon_box2 icon_type=&#8221;image&#8221; icon_size=&#8221;48&#8243; icon_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/portal_rund_150_150_web.png&#8221; title=&#8221;Self Service&#8221; title_size=&#8221;22&#8243; title_weight=&#8221;bold&#8221; title_bottom_padding=&#8221;0&#8243; align=&#8221;left&#8221;].PORTAL[\/mk_icon_box2][\/mk_custom_box][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1526561376929{padding-right: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;link secure-erelations&#8221;][mk_custom_box padding_vertical=&#8221;20&#8243; background_hov_color_style=&#8221;image&#8221; bg_hov_color=&#8221;#f27700&#8243;][mk_icon_box2 icon_type=&#8221;image&#8221; icon_size=&#8221;48&#8243; icon_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/erelation_orange_rund_150_150_web.png&#8221; title=&#8221;Employee reviews&#8221; title_size=&#8221;22&#8243; title_weight=&#8221;bold&#8221; title_bottom_padding=&#8221;0&#8243; align=&#8221;left&#8221;].RELATIONS&amp;SCORING[\/mk_icon_box2][\/mk_custom_box][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1526561384192{padding-right: 0px !important;padding-left: 0px !important;}&#8221; el_class=&#8221;link add-ons&#8221;][mk_custom_box padding_vertical=&#8221;20&#8243; background_hov_color_style=&#8221;image&#8221; bg_hov_color=&#8221;#5b7e96&#8243;][mk_icon_box2 icon_type=&#8221;image&#8221; icon_size=&#8221;48&#8243; icon_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2018\/05\/add_ons_rund_150_150_web.png&#8221; title=&#8221;Add ons&#8221; title_size=&#8221;22&#8243; title_weight=&#8221;bold&#8221; title_bottom_padding=&#8221;0&#8243; align=&#8221;left&#8221;][\/mk_icon_box2][mk_padding_divider size=&#8221;25&#8243;][\/mk_custom_box][\/vc_column][\/vc_row][vc_row][vc_column][mk_padding_divider size=&#8221;80&#8243;][\/vc_column][vc_column][mk_padding_divider][mk_page_section][\/mk_page_section][\/vc_column][\/vc_row][mk_page_section bg_color=&#8221;#e74c39&#8243; border_color=&#8221;#e74c39&#8243; speed_factor=&#8221;4&#8243; min_height=&#8221;0&#8243; padding_top=&#8221;60&#8243; padding_bottom=&#8221;40&#8243; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;false&#8221; last_page=&#8221;false&#8221;][vc_column width=&#8221;2\/3&#8243;][mk_fancy_title color=&#8221;#ffffff&#8221; size=&#8221;25&#8243; font_weight=&#8221;bold&#8221; font_style=&#8221;inhert&#8221; margin_bottom=&#8221;18&#8243; font_family=&#8221;none&#8221;]We are pleased to cooperate[\/mk_fancy_title][\/vc_column][vc_column width=&#8221;1\/3&#8243;][mk_button dimension=&#8221;outline&#8221; size=&#8221;medium&#8221; icon=&#8221;mk-icon-long-arrow-right&#8221; icon_anim=&#8221;side&#8221; url=&#8221;\/kontakt\/&#8221; outline_skin=&#8221;light&#8221;]CONTACT US[\/mk_button][\/vc_column][\/mk_page_section]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2023\/01\/gis_prinzip-freiheit.png&#8221; bg_color=&#8221;#5b7e96&#8243; bg_position=&#8221;right center&#8221; bg_repeat=&#8221;no-repeat&#8221; min_height=&#8221;0&#8243; padding_top=&#8221;85&#8243; padding_bottom=&#8221;85&#8243; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_style=&#8221;curve-bottom&#8221; visibility=&#8221;hidden-sm&#8221; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221;][vc_column width=&#8221;1\/2&#8243;][mk_padding_divider size=&#8221;120&#8243;][mk_padding_divider size=&#8221;50&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/gis-consulting.de\/wp-content\/uploads\/2023\/01\/gis_prinzip-freiheit.png&#8221; bg_color=&#8221;#5b7e96&#8243; bg_position=&#8221;right center&#8221; bg_repeat=&#8221;no-repeat&#8221; min_height=&#8221;0&#8243; padding_top=&#8221;85&#8243; padding_bottom=&#8221;85&#8243; bottom_shape_style=&#8221;curve-bottom&#8221; visibility=&#8221;visible-sm&#8221; sidebar=&#8221;sidebar-1&#8243; first_page=&#8221;true&#8221; last_page=&#8221;false&#8221;][vc_column][mk_padding_divider size=&#8221;120&#8243;][mk_padding_divider size=&#8221;80&#8243;][\/vc_column][\/mk_page_section][vc_row padding=&#8221;0&#8243; css=&#8221;.vc_custom_1674033141519{padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;][vc_column][mk_padding_divider size=&#8221;20&#8243;][vc_single_image image=&#8221;22523&#8243; img_size=&#8221;100&#215;100&#8243;][mk_fancy_title tag_name=&#8221;h1&#8243; color=&#8221;#4a4f55&#8243; size=&#8221;32&#8243; font_weight=&#8221;bold&#8221; margin_bottom=&#8221;0&#8243; font_family=&#8221;none&#8221;] Our principles [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-23650","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/23650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=23650"}],"version-history":[{"count":11,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/23650\/revisions"}],"predecessor-version":[{"id":26249,"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/pages\/23650\/revisions\/26249"}],"wp:attachment":[{"href":"https:\/\/gis-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=23650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}