Customized software for secure online consulting
Our web-based counseling software enables you to provide data-protection-compliant and low-threshold online counseling for the exchange of sensitive topics.
Online advice with maximum security and data protection
What distinguishes our consulting software?
- Synchronous and asynchronous advice
In addition to live chat advice, your target group also has the option of submitting their request outside of office hours. They will be informed on request and can respond flexibly. - Individual design
Every advice center has different requirements. Do you need customizations and additional functions? - We will build a customized solution for you. - Low threshold and anonymity
Access to advice is as low-threshold as possible. People seeking advice do not need an app, registration or login. - Total solution carefree package
In addition to designing the advisory software, we also take care of implementation, operation, regular updates, backups and monitoring. - Statistics and feedback
Extensive evaluation options give you a precise insight into your advisory activities and the concerns of your advice seekers.
Which topics are particularly suitable for online counseling?
Psychosocial counseling
Do you support people in challenging life situations and sensitive issues? You therefore attach great importance to security and guarantee that data breaches are ruled out. You don't want your target group to have to install an app or go through a time-consuming registration process, but instead want to provide immediate help at the moment it is needed?
With our web-based online chat, you can offer quick and direct advice - exactly when it is needed.
Employee Assistance Program
Would you like to enable your employees to share concerns or complaints anonymously? Our online chat offers a secure and confidential space - without the need to provide email addresses or real names. Chat histories are not stored permanently to ensure maximum anonymity.
Thanks to the simple integration into your platforms, such as the intranet, your employees can start the chat with just one click and receive immediate support.
Our portfolio Success stories of our customers
Learn more Security in online chats: How it works
FAQ on online consulting
Confidentiality (using end-to-end encryption and SSL or TLS), data integrity (using hash functions) and availability are important requirements for secure communication. In addition, the server and company headquarters must be located within the EU, the consulting tool should be ISO/IEC 27001 certified and comply with the GDPR. These requirements are of course met by makandra's individual consulting software.
No, because emails are not end-to-end encrypted by default. However, counsellors are subject to confidentiality in accordance with Section 203 of the German Criminal Code (StGB) and must therefore ensure that communication with those seeking advice cannot be leaked to third parties at any time - whether due to technical or organizational deficiencies. As the advisors are unable to trace whether emails are also transmitted unencrypted to the recipient, such a communication channel is unsuitable. Unauthorized disclosure of entrusted secrets is a criminal offence for persons subject to professional secrecy.
With end-to-end encryption, public keys that encrypt the message are exchanged by the sender and the recipient before communication begins. The message can then be decrypted using a matching private key. For a consultation via e-mail, however, a browser extension must first be downloaded to the computer of both parties. End-to-end encryption is therefore necessary, but does not enable low-threshold and spontaneous contact in the context of advice via email.
A hash function is a mathematical function that can be used to check whether a message has been manipulated between the sender and recipient. The function is used to convert the input into a hash value. This is unique and must not allow any conclusions to be drawn about the content of the message. Similar content must therefore not provide a similar hash value. The receiving computer checks whether the hash value is identical to the original value.
Digital signatures can only be used to check whether the content of a message has been changed without being able to view the manipulated parts. With electronic signatures using GPG, on the other hand, manipulated content is made visible to the recipient.
Plug-ins that are installed by the sender and only encrypt attachments are unsuitable for protecting personal data in emails. Even transport encryption using TLS or SSL only guarantees encrypted transmission to the mail provider's server, but not to the recipient of the message. End-to-end encryption is therefore absolutely essential and SSL or TLS alone is insufficient.
All content of communications between advice seekers and advisors is encrypted end-to-end and cannot be viewed by makandra as the operator. For the purpose of visiting the web application, we only collect and process the information that the Internet browser automatically transmits to us in order to deliver the contents of the web application correctly, to ensure network and information security and to protect the application from attacks, malfunctions and damage.
Der Datenschutz steht bei der Beratungssoftware von makandra an oberster Stelle und gewährleistet den DSGVO-konformen Austausch sensibler Themen und Daten. Wir halten uns dabei an die Grundprinzipien Datenvermeidung und -sparsamkeit sowie Zweckbindung und Rechtmäßigkeit. Das Verhalten der Klientinnen und Klienten wird weder mit Cookies noch mit einer Tracking-Software beobachtet.
Yes, you are very welcome to test the consulting software without obligation. Please use the contact form at the bottom of the page or contact us by email at fabian.rimpl@makandra.de or by phone on 0821 588 66 167.
Who provides the consulting software?
We at makandra GmbH, based in Augsburg, have been providing consulting services for demanding online projects and developing customized software solutions since 2009. We are absolute thoroughbred technicians and are known for creating stable and technically outstanding solutions from complex requirements. We cover the entire life cycle - from consulting and requirements analysis to development and the secure and highly available operation of web applications. We always complete our projects within the agreed time and budget.