Search
SECURITY

IT Security.
Consulting.
Pentesting.
Incident Response.

We are a specialized company focusing on information security, carrying out penetration tests, supporting our customers in the German-speaking countries and advising them on information and IT security questions.

Awards

Benefit from our many years of experience in the field of IT security.

Security-Projects
0 +
Employees
0 +
Clients
0 +
Founded
0
IT SECURITY TRAININGS

Benefit from our Expertise

We offer customized workshops and trainings to show you how to correctly use modern technology and provide you with information about the latest topics in the field of IT security.

Has Your System Been Attacked?

If you have been the victim of a cyber attack, contact our specialists. With an appropriate contract, you can reach us 24/7 in an emergency.

OFFER

All-Around Security

We offer a broad portfolio of various services and are able to respond individually to your needs and requirements.

Protection against Targeted Attacks

Our malware protection analysis demonstrates how well your company is protected against today’s malware.

Learn more

TLPT: Threat-oriented Penetration Tests in Accordance with DORA

Together with you, we will determine a suitable overall package depending on your budget and the need of a compulsory TLPT.

Learn more

Vulnerability & Risk Management

We will be happy to support you in designing and selecting a technology that is appropriate for your company and we can also implement it if you wish.

Learn more

Office 365 Security

We consult you about the implementation and secure operation of Office 365. In addition, we offer a two-day training on this topic.

Learn more

EDR & XDR

We know all the details about these modern approaches and products, as well as their actual effectiveness and their limits. We are happy to assist you in analyzing, designing and implementing suitable protective measures.

Learn more

360-Degree Analysis

The 360-degree analysis aims to gather information on the existing applications, IT infrastructure, protective measures that have been taken and IT-security-relevant processes in an overall context to identify and evaluate potential attack vectors and vulnerabilities.

Learn more

Do you want to protect your systems? Feel free to get in touch with us.
Search
Search