Single Sign-On Passwordless Authentication with Data Protection

Protect users' data with our Privacy-first Platform, Blockchain inspired and Cryptography native

COMPANY ADVANTAGESIANUM FOR USERS

Built For Everyone

Companies

Easily combine our tools to improve your customer data protection. Enjoy effortless integration with your processes. Safeguard your digital assets with our cutting edge technology

People

Protect your privacy by governing your data and consents. Secure your identity with our anti-fraud authentication system.
Everything from your smartphone
Find out More →

A Platform made of connected tools

Choose what you need to reach your goals. Ianum® is built of Privacy by Design components, easy to combine based on your needs.

Consents management, encryption, protection against data breach, anonymization, or passwordless logins are just few examples of what you can do with Ianum® tools.

With Ianum Platform you can ...

COMING SOON

Secure Vault

Protect confidential tokens and informations generated by users on your services

File Encryption

Encrypted storage space where you can store any binary file

COMING SOON

Blockchain Integration

Store cryptographically signed timestamp proofs on public or private blockchains

COMING SOON

Digital Identity

For countries adopting it, Ianum will be able to manage your Digital Identity

COMING SOON

IoT Machine-To-Machine

Control data produced by IoT devices, and safely manage ownership

COMING SOON

Passwordless Authentication

Smartphone based authentication without the boredom of passwords

Single Sign-on
Identity Provider

Passwordless login for SAML 2.0 compatible business applications

Consent Management

Directly manage your customer consents, anonymizing them

Personal Data Protection

Users can  safely share personal information, stored protected and encrypted

Secure Vault

Protect confidential tokens and informations generated by users on your services

COMING SOON

File Encryption

Encrypted storage space where you can store any binary file

COMING SOON

Blockchain Integration

Store cryptographically signed timestamp proofs on public or private blockchains

COMING SOON

Digital Identity

For countries adopting it, Ianum will be able to manage your Digital Identity

COMING SOON

IoT Machine-To-Machine

Control data produced by IoT devices, and safely manage ownership

COMING SOON

REQUEST A DEMO

See the power of Ianum in Action

Get a free 30-mins demo to see what Ianum can do for you, for your business and for your customers

REQUEST A DEMO

Easy to Integrate

Make your choice among our integration solutions and integrate Ianum® within your processes with just few simple steps.

Ianum App

Let your users adopt our public App to interact with your Ianum® integration

White Label (SDK)

Include Ianum® in your smartphone App or Backend Logic and improve user experience

API Integration

Fully customize your Ianum® connection calling directly our API REST endpoints

Usage Examples

Manage Users onboarding

Onboarding means registering the user for the first time, collecting some basic information, and asking them to accepts agreements such as Terms and Conditions of your services or Marketing newsletter. You can manage all this process using Ianum® Passwordless Authentication.

CONTINUE READING

Consents Management

You have a set of agreements your users signed: when they first registered, when they purchased a new service, etc. Over time you update them and users have to accept new ones. Integrating Ianum consents management, you can do everything automatically.

CONTINUE READING

Identity Provider

Manage employee access within company services is crucial. Emails, HR platform, internal applications: each company has a huge variety of software. Managing employee access with a central identity provider is the key of success.

CONTINUE READING

Users event registration

Event registration is the heart and the first point of contact of an event. Providing secure and mobile-responsive event registration is the key to success. Ianum is a great solution for mobile registration.

CONTINUE READING

Benefits of Ianum® Platform

GDPR Compliance

Adopting Ianum® within your processes guarantees you are GDPR compliance in users’ data management

Privacy By Design

Ianum® has been built with privacy in mind. No one can read your users' data, not even our developers, making it a trusted secure tool

Cryptography Native

Everything is built with encryption and cryptography in mind, to ensure data can be decrypt only by the owner of the key

Data Breach Free

We hold encrypted data, you hold the keys. In this way, massive data breach are impossible to become reality

Security Compliant

We are compliant with all the main infrastructure and development security standards such as SOC 1 / 2 / 3, PCI, ISO 9001 / 27001 / 27017 / 27018

Control Data Location

You decide where to store all your data managed with Ianum, whether on our cloud available locations or on-premise

Ianum® Partner Program

Our partners offer a diverse array of expertise, skills, resources and technologies to ensure the success of our mutual customers. The Ianum® Partner Program provides the resources and support to help you engage and connect with your customers, building privacy-first tools based on Ianum® Platform

ReD Open S.r.l.
STRATEGIC ALLIANCE PARTNER

Leader in the innovators’ ecosystem, ReD Open is commited to corporate sustainability by valuing the responsibility of data governance in decision-making.

Be Our Next Partner!

Let’s build together a better future where privacy and data protection matter

JOIN NOW