500+
Organizations trust us
2M+
Logged events / day
99.99%
Uptime
NIS2 ✓
Audited compliance
Lecnote modules are fully integrated with each other, but can also be deployed independently. Start with one area, expand as your organization grows.
Granular, role-based access control (RBAC). Per-user, per-group and per-system configuration to define who can access what – and when.
Every organizational process follows a defined approval path. Responsible approvers and executors are automatically notified, and status is always up to date.
Every event is automatically recorded in tamper-proof logs. Full traceability, real-time reports and anomaly detection.
Automatic two-way connection with Moodle and other LMS platforms. Course completions, certificates and permissions sync automatically – without any manual intervention.
Physical access control and parking system integration or fresh installation. See who entered where and when – linked directly to digital access management.
Enterprise-grade features: dedicated tenant, on-premise deployment, custom SLA, dedicated security advisor and priority incident handling.
Lecnote's workflow engine ensures that no permission change, system access or critical configuration can happen without authorized approval. No "manually set" — only audited processes.
Request submission
The user or system submits the access or change request. The system automatically identifies the affected resources and required approvers.
Automatic risk assessment
The system classifies the request (low / medium / critical) based on organizational policies and sets the appropriate approval levels accordingly.
Approver notification & decision
Relevant approvers receive email, push or in-app notifications. They can approve or reject with one click — with reasoning logged immutably.
Execution & logging
The approved change is automatically executed (or delegated to the executor), and every step is recorded in tamper-proof logs.
Closure & auditability
The process closes and the full history remains accessible. Any external auditor or internal compliance team can retrieve and export it.
WF-2024-1183
Elevated privilege request
Requester
Thomas Nagy
Development team
Requested resource
prod-db-01
Critical system
Duration
4 hours
Expiry: auto-revoke
Risk classification
HIGH
2-level approval required
Justification
Read access to production needed to investigate a query performance issue in the live environment. Ticket: INC-4421.
Approval chain
Direct manager approval
Peter Kovacs · 14:22
IT Security Manager
Eva Szabo · Waiting…
CISO final approval
Auto if level 2 approves
Lecnote doesn't just manage software permissions. It connects your learning management systems, physical access controls and time tracking — giving you a unified picture of your organization.
When a team member completes required training, Lecnote knows instantly — and automatically activates the appropriate resource access. When a certificate expires, access is revoked. All without any human intervention.
Automatic permission assignment
Course completion immediately activates pre-configured access rights.
Certificate expiry management
Automatic reminders and access revocation when certifications expire.
Open API – works with any LMS
SCORM, xAPI, LTI standards and REST API — if you have an LMS, it can be connected.
We integrate your existing access control hardware, or install our own. See who entered which location and when — all linked to digital access management. One person, one profile, every movement logged.
Zone and building-level permissions
Who can enter the server room, lab or office?
Parking management
License plate recognition, booking and logging.
Movement log & occupancy reports
Who was where and when — searchable and exportable.
Compatible with: Hikvision, ZKTeco, AXIS, Bosch, Suprema and custom hardware
Complete time management: attendance logs, shift planning, holiday and absence management. Attendance is generated automatically from access control data — no manual clocking, no paper forms.
Shift planning & scheduling
Visual calendar, rotating shifts, holiday management.
Automatic attendance log
Entry/exit times from access control feed directly into work records.
Payroll export
Monthly summaries, overtime calculation, SAP/HRIS export.
Lecnote's logging system is built so that nobody — not even an administrator — can modify or delete recorded events after the fact. This is the foundation of legal compliance and incident handling alike.
Immutable log storage
Logs are stored on write-once storage. A cryptographic hash chain ensures integrity — any tampering is immediately detectable.
Real-time search & filtering
Any event can be retrieved in seconds by user, timestamp, event type or affected system — across up to one year of history.
Anomaly detection & alerting
The system automatically flags unusual behavioral patterns: suspicious login locations, bulk permission requests, off-hours access attempts.
Compliance report export
Pre-built report templates for NIS2, ISO 27001, GDPR and internal audits. PDF and CSV export, with optional scheduled email delivery.
Regulatory compliance
Lecnote's logging, access management and audit features help meet the most important compliance requirements.
We don't believe in one-size-fits-all pricing. Request a custom quote — together we'll find the right solution and terms for your organization.
Starter
Smaller organizations · flexible terms
Pro
Mid-size & larger organizations · on-premise option
Enterprise
Large enterprise · multi-site · on-premise
Social solidarity
We believe that secure digital operations are not a luxury, but a right. That's why we offer discounted pricing for schools, universities, libraries, museums and non-profit cultural organizations — because their knowledge and work is a value for all of society. Contact us to request an institutional quote.
Custom pricing & Partners
Not every organization fits into a box. If you have special requirements — multi-site deployment, reseller partnership, public sector framework agreements or unique hardware integration — contact our partners directly for a tailored quote. We'll design the solution that fits you.
All prices exclude VAT. Request a detailed, personalized quote.
Fragmented systems are not just an efficiency problem — they carry serious security risks. A central platform solves this.
8 min read
The EU NIS2 directive sets specific technical requirements. We walk through what needs to be met and how.
11 min read
Zero Trust's core principle: "never trust, always verify." How does a central platform implement this?
9 min read
Over-privileged accounts are one of the most common internal security risks. A step-by-step guide to protection.
10 min read
In a 45-minute, no-obligation online session we show you exactly how Lecnote fits into your organization's existing infrastructure.
Live system demo
We configure and show the platform based on your own organizational structure.
NIS2 gap analysis
A short questionnaire helps us identify compliance gaps and show how Lecnote closes them.
With a certified security expert
A Lecnote-certified security advisor joins the demo to answer all your questions.
Your data is used solely to schedule the demo. GDPR-compliant data handling.