embedded world 2016: LEGIC draws a positive balance

A very successful and interesting trade show for LEGIC came to an end. For the first time, LEGIC presented its secure and innovative IoT solutions at embedded world in Nuremberg. We want to thank all our ID Network Partners, our new Business Partner IBM® as well as the numerous new customers, interested parties and members of the press, who contributed to this successful event.

A booth full of visitors, interesting discussions as well as promising enquiries are only a few of the many trade fair highlights. LEGIC is proud to be able to draw such a positive balance: not only LEGIC’s end-to-end security for the Internet of Things impressed the visitors, also the presented scenario with IoT-enabled machines received many compliments.

Security in IoT – with LEGIC

When millions of items are connected to each other and to the Internet, security risks are inevitably involved: unauthorized access to the device, data theft, identity fraud or loss of control. Through the implementation of security elements, risks can be reduced. LEGIC’s hardware protects IoT devices through encrypted 
end-to-end communication between device and operator back-end system as well as provides a secure device registration and identification. 
The trusted service LEGIC Connect with a lean API to integrate operator clouds and back-end systems ensures a secure deployment of credentials.

LEGIC News magazine

Independence thanks to standard segments

The company ZF Friedrichshafen AG has opted to use the advantages of LEGIC technology and standardized access and payment segments with its new group ID system.

Press releases

Two more American companies opt for LEGIC

LEGIC is proud to announce that two new license partners located in the United States join the LEGIC ID Network: 3millID and Farpointe Data. Both companies are well-known for their secure and state-of-the-art credentials and readers.

Get to know

LEGIC City

Since the beginning, we have built up wide-ranging experience in a variety of branches and environments.
We have specific strengths in the following areas:

 

All application areas