We have many years of experience in providing consulting for complex security environments as well as in designing and analyzing them.
We do not only conduct regular risk analyses, but also recommend measures, develop architectures and vendor-independent IT security concepts, and evaluate existing concepts and policies on the following topics:
If you want to have your current security level evaluated in its entirety by external, independent experts, you have come to the right place. A 360-degree analysis is the ideal context for this. It includes a one-day workshop, followed by an analysis and documentation.
The 360-degree analysis aims to gather information on the existing applications, IT infrastructure, protective measures that have been taken and IT-security-relevant processes in an overall context to identify and evaluate potential attack vectors and vulnerabilities.
In line with common standards, the following topics, amongst others, will be covered:
There is no rigid pattern for the 360-degree workshop. Our consultants are also happy to consider and discuss your current key topics and questions.
Following the workshop, we will prioritize the findings, and we will determine and document technical and organizational recommendations for possible measures.
On request, the results can also be used to carry out a detailed structured threat and risk analysis.
The results of the 360-degree analysis will show to security managers the possible fields of action according to priority.
Detecting security incidents early and reacting appropriately is becoming increasingly important. Having the right sensors and detection technologies for this is only the first step. It also requires competent staff, defined processes and additional technical infrastructure to verify alarms and handle incidents.
We assist you with setting up your own security operations center or choosing a suitable service provider.
There are plenty of offers for MDR or Managed SOC services on the market. For choosing the one that suits your company best, it is crucial to ask the right questions. Offers differ in terms of the architectures and operating models used and must be suitable for a client’s situation and infrastructure.
Together with you, we will create the right catalog of requirements and questionnaires to evaluate the offers and help to avoid expensive mistakes.
But not everything can be outsourced to external service providers. We explain which roles and processes for incident response need to be set up internally in order to be able to defend yourself effectively in case of an attack. We also assist with establishing and training an internal incident response team.
Today, enterprises are constantly exposed to APTs or targeted attacks in which professional and individual malware is used.
As a possible solution, the market offers both different technical approaches for detection and response and new prevention mechanisms.
If you want to find out how well your company is protected against today’s malware and identify the most useful measures and techniques to reach the level of protection you require, we can help you by creating a malware protection analysis or concept.
In an initial workshop, we will first determine the current situation at your company in terms of malware protection. This workshop will also provide you with an overview of the current threat situation and the methods available today to detect and block malware.
The information gathered will be used in an effectiveness matrix, derived in a structured way, to evaluate both the current technical situation and the malware protection policies that are already implemented.
We will then use this as a basis to develop a suggestion for malware protection that is both comprehensible and economically feasible
Moreover, we advise you on the possible implementation of protective technologies.
Using the cloud plays an increasingly important role for Germany as well.
New threats and specific security controls are relevant in the cloud, and they require detailed understanding of the security aspects relevant in the respective cloud environment.
Security controls like mail security gateways or web proxies are also increasingly often used as cloud services and are meanwhile getting marketed as SASE or SSE solution by almost every large vendor.
We assist you with creating concepts and choosing the most suitable solution. Furthermore, we offer security analyses and trainings on the security in both the Azure and AWS clouds as well as for Office 365.
Vulnerabilities provide doors for hackers and malware to enter a system or network. They mostly result from a bad configuration or errors in operating systems, network services or applications.
In practice, it is often necessary to weigh the risk of a possible impact due to a vulnerability against the risk of a possible impact due to an improperly performed remediation. Just blindly installing service packs or patches must be replaced with remedying the vulnerabilities in a deliberate and targeted way. This is realized by systematically recording the actually existing vulnerabilities and evaluating them while taking the actual infrastructure, applications and business process into account.
Vulnerability management is a process supported by suitable tools that gathers, processes, evaluates and distributes information about vulnerabilities and controls their remediation.
We will assist you with creating a concept and selecting a technology that is appropriate for your company. If requested, we will also implement this technology for you.
Zero trust paradigms and architectures say goodbye to the traditional implicit trust put in a seemingly secure internal network, in secure company devices or internal user accounts. Instead of regarding access from the internal network as secure, zero trust means that both the context and the risk of access as well as the security status of the source are considered and the behavior at the time of access is observed, which allows a prompt intervention in case of anomalies.
Zero trust therefore is no product that can simply be purchased but a range of ideas that should be taken into account in the further development of IT structures.
We gladly consult you on what this term is all about and how you can better secure your company IT in accordance with zero trust.
Administrators often have unrestricted access to a wide range of company data. They can access, modify, delete or send data, which may result in uncontrolled data leakage.
The market has been providing technical solution ensuring the traceability and control of administrative access for several years now.
We assist you in both creating a concept and evaluating and implementing it. Moreover, we will be happy to provide you with the relevant products.
In the age of targeted attacks and APTs, the technologies available for the protection of endpoints are in a constant state of flux.
Endpoint and extended detection & response (EDR, XDR) aim at detecting compromised systems and supporting incident response.
EDR solutions are installed on the endpoint and monitor the behavior of all processes. What is important is not the users’ behavior but the technical processes like access to files and the registry, communication, starting of processes, manipulation of the storage of processes and much more.
All these operations are considered in an overall context, often also using modern AI techniques, in order to detect a hacking attack or malware.
When an EDR solution is managed in the vendor’s cloud and when additional security products are integrated in the same management besides the EDR agent and are being analyzed together, this is typically called extended detection & response (XDR).
Often, vendors also offer a managed service for this, calling the whole package managed detection & response (MDR).
We know all the details about these modern approaches and products, as well as their actual effectiveness and their limits. We are happy to assist you in analyzing, designing and implementing suitable protective measures.
An increasing number of things in our daily life, in a company buildings or in production are getting networked and communicate via the Internet.
For our customers, we assess the security of these devices and their related apps as well as the security of cloud services.
We will also gladly assist you in implementing IT security in automation (IEC 62443).
We are happy to assist you in the following areas:
Not only do flaws in application security threaten the application, but they might often also affect the back-end systems involved or the entire internal IT. For this reason, the protection of applications, portals and web services is essential to the IT infrastructures of most modern companies.
We will gladly support you in designing, selecting and implementing an appropriate solution.
Thanks to our long-standing experience in the field of audits and penetration tests, we are able to comprehensively examine your web applications, portals and web services for potential vulnerabilities.
This way we ensure that you find your vulnerabilities and close the gaps before an attacker can find and exploit them.
Today, most information is stored and processed using information technology. In addition, business processes in companies are usually highly dependent on well-working IT systems. Identifying and assessing the risks resulting from the use of information technology and attaining the desired level of protection requires professional information security management. It must be supported by executive management, lived as a process throughout the company and integrated into the corporate security system.
Overview of the services we offer in information security and risk management:
We consult you about the implementation and secure operation of Office 365.
For most companies, Active Directory is one of the most critical components for security. Its architecture, the AD tiering or the initial setup of the suitable tiers as well as the assessment of the secure configuration are important aspects with which we regularly assist our customers.