Skip to content
  • About Us
    • Siemens
    • Bosch
    • Read ID
    • Swiss Sign
    • Johanniter
    • Centogene
    • ECOSPEED
    • RSB Logistics
    • Roche
  • Services
    • Setting up an ISMS in accordance with ISO 27001
    • ISO 27001 development plan
    • Gap-analysis in accordance with ISO 27001
    • IT Security Act & KRITIS
    • KRITIS Umbrella Act
    • Intrusion Detection Systems (IDS)
    • Information Security according to the Energy Industry Act (EnWG)
    • Transition ISO/IEC 27001:2022 for energy system operators and operators of energy systems classified as critical infrastructure
    • External ISO/CISO
    • Supporting IT Auditing and IS Auditing
    • Freshmaker
    • ISMS implementation in accordance with ISO 27001 based on IT-Grundschutz
    • Gap analysis ISO 27001 on the basis of IT-Grundschutz
    • NIS-2
    • DORA
    • TISAX® Gap-Analysis
    • TISAX® Transition ISA 6
    • AI-Governance
    • SWIFT-Assessment
    • Industrial Security Concepts – IEC 62443
    • Data Center Certification
    • Examinations according to §8a (3) BSI Act
    • Internal ISMS audit / first party audit
    • Accredited
    • In-house certificates
    • Implementation of a BCMS according to BSI Standard 200-4 and/or ISO 22301
    • Implementation of a reactive BCMS according to BSI standard 200-4
    • BCMS gap analysis
    • Provision of an external business continuity manager
    • Planning and realisation of staff exercises
    • Planning and realisation of functional tests (cyber drill, partial and full simulations, system tests)
    • Internal audit according to ISO 22301
    • IT vulnerability scan
    • Phishing
    • Web Application Scan
    • Agile cyber security quick test
    • Microsoft 365 Security Audit
    • Red Teaming Assessments
    • SAP Pentests
    • Assume Breach
    • SAP-BTP
    • System and application audits
    • SAP Authorizations
    • Threat Modeling
    • Concept development in IT security
    • Product evaluation for security components
    • Architecture review for technical infrastructures
    • Social Engineering
    • Awareness Trainings
    • OSINT (Open Source Intelligence)
    • Accredited
    • In-house certificates
    • Technical audit services
    • Consulting Common Criteria
    • DiGAV – our support services
    • Act for the Better Protection of Whistleblowers (HinSchG)
    • EU GDPR GAP Analysis and Recommended Measures
    • External Data Protection Officer
    • Trust Services, Electronic Identities, and the New Wallet for EU Businesses and Citizens
    • Conformity assessment and Certification of electronic ID Services (eID) and Trust Service Providers (TSP)
    • Services for Users of electronic ID (eID) and Trust Service Providers (TSP)
    • Certification in accordance with ISO 27001 by TÜV AUSTRIA Deutschland GmbH
    • DiGA / DiPA
    • Governance & Compliance
    • Trusted Blockchain
    • Trusted Application: Certification for Applications on SAP®-BTP-Platform
    • Certification in accordance with ISO 27001 on the basis of IT-Grundschutz
    • Certification of IT Applications “TÜV TRUST IT Trusted Application”
    • Certification of apps “TÜV TRUST IT Trusted App”
    • Certification of Cloud Services “TÜV TRUST IT Trusted Cloud Service”
    • Certification of Data Centers “TÜV TRUST IT Trusted Data Center”
    • Certification of IT services “TÜV TRUST IT Trusted Service”
    • Certification of software development processes “TÜV TRUST IT Trusted Development”
    • Certification of network components “TÜV TRUST IT Trusted Infrastructure”
    • Certification of network components “TÜV TRUST IT Trusted Infrastructure”
    • Testing and certification of IoT devices “TÜV TRUST IT Trusted IoT-Device”
    • Certification of “TÜV TRUST IT Trusted Usability”
  • Security-Know How
    • NIS-2 training for executive bodies
    • BSI IT-Grundschutz Practitioner
    • ISO/IEC 27001:2022 – Transition
    • certified isms-manager
    • certified risk-manager
    • certified isms-auditor
    • Special features in the introduction and operation of an ISMS in the energy sector
    • BCM-Practitioner
    • ISMS Experience Exchange
    • Test-Procedures Competences According to BSI Act § 8a
    • BCM Basics
    • eIDAS 2 Basic Training
    • eIDAS ETSI special topics
    • Training offer by TÜV AUSTRIA Deutschland GmbH
    • Working Group ISMS for Energy Suppliers
    • Webcast „SAP® BTP Cloud Security“
    • Webcasts “eIDAS” with special topics
    • Webcast „Live-Hacking | Spear Phishing and Malware.“
    • Live-Podcast „BCM – “But please, keep it simple“
    • Webcast „We secure digital health. IT-Security for DiGA and DiPA.“
    • Webcast: “Security in the Microsoft 365 Cloud – How to Protect Your Data.”
    • Webcast: “SAP® Cyber Attack – Current Threats in 2025”
    • Digital Roundtable on the NIS-2 Implementation Act: One-way communication is a thing of the past.
    • Webcast: Hacking and AI – Use Cases, Trends, and Criticism
  • Insights
  • Jobs
  • Contact
  • Deutsch
Flyout Menu
  • About Us
    • Team
    • Success Stories
      • RSB Logistic
      • Roche
      • Ecospeed
      • Centogene
      • Johanniter
      • Bosch
      • Siemens
      • Swiss Sign
      • ReadID
  • Services
    • Information Security Management
      • IS Implementation
        • Setting up an ISMS in accordance with ISO 27001
        • ISO 27001 development plan
        • Gap-analysis in accordance with ISO 27001
        • IT Security Act & KRITIS
        • KRITIS Umbrella Act
        • Intrusion Detection Systems (IDS)
      • Information Security according to the Energy Industry Act (EnWG)
      • IS Operations
        • Transition ISO/IEC 27001:2022 for energy system operators and operators of energy systems classified as critical infrastructure
        • External ISO/CISO
        • Supporting IT Auditing and IS Auditing
        • Freshmaker
      • BSI IT Baseline Protection
        • ISMS implementation in accordance with ISO 27001 based on IT-Grundschutz
        • Gap analysis ISO 27001 on the basis of IT-Grundschutz
      • NIS-2
      • DORA
      • TISAX
        • TISAX® Gap-Analysis
        • TISAX® Transition ISA 6
      • AI-Governance
      • SWIFT
      • OT-Security
      • Data Center Security
        • Data Center Certification
      • Audits
        • Examinations according to §8a (3) BSI Act
        • Internal ISMS audit / first party audit
      • Certifications
        • Accredited
        • In-house Certificates
    • BCM
      • BCM Implementation
        • Implementation of a BCMS according to BSI Standard 200-4 and/or ISO 22301
        • Implementation of a reactive BCMS according to BSI standard 200-4
        • BCMS gap analysis
      • BCM operation
        • Provision of an external business continuity manager
        • Planning and realisation of staff exercises
        • Planning and realisation of functional tests (cyber drill, partial and full simulations, system tests)
      • BCM Audits
    • Cyber Security
      • Penetrationtests / Red Team
        • IT vulnerability scan
        • Phishing
        • Web Application Scan
        • Agile cyber security quick test
        • Microsoft 365 Security Audit
        • Red Teaming Assessments
        • SAP Pentests
        • Assume Breach
      • Compliance Check
        • Technical Cloud-Assessments
        • System and application audits
        • SAP-Berechtigungen
      • Thread Concept
        • Threat Modeling
        • Concept development in IT security
        • Product evaluation for security components
        • Architecture review for technical infrastructures
      • Social Engineering
        • Social Engineering
        • Awareness Trainings
        • OSINT (Open Source Intelligence)
      • Certifications
        • Accredited
        • In-house Certificates
      • More technical Services
        • Technical audit services
        • Consulting Common Criteria
    • Data Privacy & Compliance
      • Legal Requirements
        • DiGAV – our support services
        • Act for the Better Protection of Whistleblowers (HinSchG)
        • EU GDPR GAP Analysis and Recommended Measures
      • external employees
    • eIDAS & Trust Services
      • Assessment and Certification
      • eIDAS Consulting
    • Certifications
      • Accredited
        • Certification in accordance with ISO 27001 by TÜV AUSTRIA Deutschland GmbH
        • Digital health and nursing applications (DiGA / DiPA)
      • In-house Certificates
  • Security-Know how
    • Trainings
      • BCM Basics
      • BCM-Practitioner
      • BSI IT-Grundschutz Practitioner
      • certified isms-auditor
      • certified isms-manager
      • certified risk-manager
      • eIDAS 2 Basic Training
      • eIDAS ETSI special topics
      • ISMS Experience Exchange
      • ISO/IEC 27001:2022 – Transition
      • NIS-2 training for executive bodies
      • Special features in the introduction and operation of an ISMS in the energy sector
      • Test-Procedures Competences According to BSI Act § 8a
      • Training offer by TÜV AUSTRIA Deutschland GmbH
    • Events
      • Working Group ISMS for Energy Suppliers
    • Webcasts
      • Digital Roundtable on the NIS-2 Implementation Act: One-way communication is a thing of the past.
      • Live-Podcast „BCM – “But please, keep it simple“
      • Webcast „Live-Hacking | Spear Phishing and Malware.“
      • Webcast „SAP® BTP Cloud Security“
      • Webcast „We secure digital health. IT-Security for DiGA and DiPA.“
      • Webcast: „SAP® Cyber Attack – Current Threats in 2025“
      • Webcast: „Security in the Microsoft 365 Cloud – How to Protect Your Data.“
      • Webcast: Hacking and AI – Use Cases, Trends, and Criticism
      • Webcasts “eIDAS” with special topics
  • Insights
    • News
  • Jobs
  • Contact

Success Stories

Home Trennzeichen ReadID

ReadID

Innovation meets individuality – InnoValor B.V. benefits from four certifications with a one-time effort.

Special products deserve special solutions.
The ability to digitally verify the identity of natural persons using their ID documents is now essential, especially in the field of trust services. The Dutch FinTech company InnoValor B.V. has made this its mission and offers an innovative yet straightforward identity verification solution with its software ReadID. This solution leverages the capabilities of modern ID documents equipped with NFC chips, in combination with the NFC technology in smartphones.

tuv-images-readid-innovalor_image-scaled
Initial situation

InnoValor has been certified according to the ISO 27001 standard for several years, but set itself the goal of going beyond this foundational certification to demonstrate the security of its ReadID software. The aim was to stand out from competitors and further strengthen the already high level of trust among its customers.

To achieve this, the company brought in TÜV TRUST IT as an independent expert. Using a new audit approach, InnoValor underwent a single assessment covering four key standards — successfully.

Following excellent results, TÜV TRUST IT awarded a modular certificate for trust services under eIDAS, a modular certificate for eID schemes under eIDAS, as well as an ISO 27001 certificate for the information security management system and an ISO 27701 certificate for data protection within the ISMS to the responsible parties at InnoValor.

Approach

The concept applied by TÜV TRUST IT in this project was custom-tailored specifically for InnoValor and individually adapted to the company’s framework conditions and customer needs. For the first time, a combined audit was conducted in a single assessment process, covering the following standards and regulations:

  • eIDAS for eID schemes,
  • eIDAS for trust services,
  • ISO 27001 (Information Security Management System), and
  • ISO 27701 (Privacy Information Management System).

This approach proved to be both cost- and time-efficient compared to conducting separate audits for each standard.

TÜV TRUST IT managed the entire coordination of the project and impressed with perfectly organized project management—from the development of the concept and initial preparatory measures to the final handover of the obtained certificates.

Thanks to the excellent audit results, InnoValor can now clearly differentiate itself from competitors in various areas with its ReadID solution. For example, the ISO 27701 certification demonstrates compliance with the GDPR and highlights the company’s strong commitment to data protection, especially when handling sensitive personal data.

The company is particularly proud of the eIDAS certification for trust services, which is not only relevant for providers of such services but also assures other InnoValor clients that ReadID meets the highest level of assurance (LoA high) for identity verification under eIDAS eID.

Your Benefits

Customers who use ReadID work with highly sensitive personal data. With this innovative solution, they now benefit not only from a completely new approach to fast identity verification, but also from one that offers proven and certified security.

TÜV TRUST IT draws a very positive conclusion:

“The project went exceptionally well from start to finish, and we are pleased that the audit was completed with truly outstanding results—especially in terms of the quality of documentation and the implemented processes.

With its innovative and now certified product ReadID, InnoValor is one of the first technology providers in the field of identity verification to offer a certified, automated identity verification software for use by trust service providers under eIDAS, as well as within eIDAS-compliant eID schemes.

As independent auditors, we warmly congratulate them on this achievement!”

– Clemens Wanko

Head of Trust Infrastructure at TÜV TRUST IT and responsible for the eIDAS Conformity Assessment Body at TÜV AUSTRIA CERT.

Bob Hulsebosch, Compliance Manager at InnoValor, praised the highly professional project and time management throughout the entire process. He emphasized that the individually developed audit approach not only resulted in significant cost and time savings for his company:

“Thanks to our certification, qualified eID and trust service providers under eIDAS who use ReadID no longer need to repeat the audit process themselves, as their auditors can now rely on our eIDAS module certification.

That’s why we are especially pleased to have been able to carry out this project in such a tailored way together with TÜV TRUST IT—an independent auditing organization in the field of IT security as well as eID and trust services.”

 
 
 
Back to overview

TÜV TRUST IT GmbH
TÜV AUSTRIA Group

LESKANPark – Haus 1
Waltherstraße 49 – 51
Germany – 51069 Cologne
Phone +49 221 96 97 89 0
info@tuv-austria.com

TÜV TRUST IT
TÜV AUSTRIA GmbH

TÜV AUSTRIA-Platz 1
Austria – 2345 Brunn am Gebirge
Phone +43 50 454 0
Fax +43 50 454 76245
info@tuv-austria.com

Contact Form
Youtube Instagram
  • Terms and conditions
  • Privacy
  • Imprint
  • Certificate Database
  • TÜV AUSTRIA Group
  • Digital whistleblower system