Without exception, the solutions developed for our clients are secure and user friendly. All of our products contain encryption algorithms and digital signatures to protect against the manipulation and interception of data. The following examples are solutions which we have implemented at least once, and often multiple times, within the scope of large overall projects. We refrain from naming our customers for reasons of confidentiality.