SecCommerce MenĂ¼
  • Home
  • Fields of Application
  • Products
  • Downloads
  • References
  • About us
  • Contact
  • Customer area

Electronic Signatures

  • The Signature Portal
  • Signature types
  • Signature tools for end users
  • FAQ (SecSigner)
  • Signatures in web applications
  • Substitute scanning and signing (e-records)
  • Digital mailroom and digital signature for incoming mail
  • Multiple signatures used for workflow
  • Verification and creation of mass signatures or individual signatures on server side
  • Long term archiving with hash trees
  • Remote Qualified Electronic Signature
  • Electronic Seal eIDAS
  • Identity and Access Management IdM 2FA

Authentification

  • Two-factor authentication with smartphone
  • Smart card based login
  • FIDO Authenticator

Encryption

  • Encryption

Private Cloud

  • Private cloud storage on your own server

High security and easy to use

Client Software

SecSigner

Create electronic signatures

SecCardAdmin

Administration of signature cards

Signatur Workflows

Signature Portal

Complex signature workflows with all signature types

SecArchive

Substitute scanning

SecPKI Server

Central server of several products

SecVerification Server

Verification & decryption

SecSigner Server

encryption & signature creation

Two Factor Authentication

SecRouter

Secures website access

SecAuthenticator

User identification

SecSignID

Two Factor Authentication

SecSignID Server

SecSignID on-premise solution

File storage & sharing

SecSign Portal Server

Secure messaging and file sharing

Electronic Signatures

  • The Signature Portal
  • Signature types
  • Signature tools for end users
  • FAQ (SecSigner)
  • Signatures in web applications
  • Substitute scanning and signing (e-records)
  • Digital mailroom and digital signature for incoming mail
  • Multiple signatures used for workflow
  • Verification and creation of mass signatures or individual signatures on server side
  • Long term archiving with hash trees
  • Remote Qualified Electronic Signature
  • Electronic Seal eIDAS
  • Identity and Access Management IdM 2FA

Authentication

  • Two-factor authentication with smartphone
  • Smart card based login
  • FIDO Authenticator

Encryption

  • Encryption

Private & Secure Cloud Storage

  • Private cloud storage on your own server

Products

  • SecSigner
  • SecSigner Server
  • SecCardAdmin
  • SecVerificationServer
  • SecArchive for substitute scanning
  • SecRouter and SecAuthenticator
  • SecPKI
  • SecSign ID
  • SecSign ID Server
  • SecSign Portal

Downloads

References

About us

Contact

Customer area

SecCommerce Blog

Recent Posts

  • Secure Remote Workflow and Home Office with Digital Signatures and Two-Factor Authentication

Categories

  • Allgemein

Category: Allgemein

20. March 2020

Secure Remote Workflow and Home Office with Digital Signatures and Two-Factor Authentication

Current developments amid the Covid-19 pandemic pose a challenge to companies that normally rely on in-office employees. Rarely any company is set up to realize an exclusively digital workflow, much... Weiterlesen

Products

Qualified digital signatures and two factor authentification.

Downloads
Inquiries

Start now and request an offer without obligation.

Request an offer
Contact

Please use our contact form, we are looking forward to answering your questions.

Contact

SecCommerce© Copyright 2025. All rights reserved.

  • English
  • Deutsch
  • Imprint & Privacy Policy
SecCommerce
Manage Consent
To provide you with the best experience, we use technologies like cookies to store and/or access device information. If you agree to these technologies, we may process data such as browsing behavior or unique IDs on this website. If you do not give or withdraw your consent, certain features and functions may be affected.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the participant or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Favorites
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance from your Internet Service Provider, or additional records from third parties, the information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles, send advertising, or track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}