Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe

Blog

How to make it easier and faster to sign a contract?

The details of a huge deal are finally agreed upon and the contract only need the official signature. However, the..

Blog digital signature electronic signature

Blog

Signature to image file or Excel?

Want to get approval for a complex calculation, chart, graphic, floor plan or similar? After official approval by the..

Blog digital signature electronic signature secure workspace

Blog

Store and share critical information digitally and securely

Does your organization handle business critical information? Do you wish you had a place to digitally store that..

Blog critical information Information security secure workspace

Blog

Using smartphones in confidential business - security threat or opportunity?

Smartphones are nowadays used by virtually everyone from schoolchildren to senior citizens, and the phones are full of..

Blog confidential information Information security

Blog

10 reasons to encrypt your company’s emails

Appropriate handling of confidential information and focusing on information security is more relevant than ever and one..

Blog email encryption confidential information data leak Information security

Blog

Identifying email recipient – how and why?

Do you send e-mails on confidential matters? Do you know who reads the e-mail you have sent? Want to be sure who the..

Blog email encryption secure e-mail strong identification

Blog

How to track the progress of your contract signing process?

You send a contract to the customer and feverishly wait for it to return signed. You do not know whether the customer has..

Blog digital signature electronic signature

Blog

Secure messaging initiated by anyone – how can it be done?

A new customer wants to send you material by e-mail so that you can make an offer. The material, however, contains..

Blog sensitive information email encryption secure e-mail confidential data

Blog

We continue to rely on signatures from the Stone Age

It is the year 2018. Flying cars seen in the old classic Back to the Future blockbuster films are long overdue. Some of..

Blog digital signature electronic signature

Blog

Cyber secure digital communications – how can it be done?

More and more companies are making use of new digital tools to ease the workload and enhance communications. With..

Blog Cyber Security Information sharing data security

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.