You decide whether to rent or buy COOR and have the choice of operating COOR via your own IT infrastructure or our data center.
The system requirements describe the necessary software and hardware requirements for the on-premises operation of the COOR software in your network.
To ensure special security options, COOR guarantees controlled access to data through authentication – optionally also single sign-on – and the role-based authorization system. In addition, an independent team of experts regularly performs penetration tests to verify compliance with internal guidelines and legal requirements.