Identity and access management

Attacks on IT systems often come from within. Applying an identity and access management (IAM) solution consistently can help you prevent these attacks or make them much more difficult.

 

Protecting critical infrastructure – KRITIS

The Federal Office for Information Security and the Federal Office of Civil Protection and Disaster Assistance have identified sectors and industries with critical infrastructure. Let us certify the safety of your infrastructure.

 

Certified basic IT security

You understand how important IT security is, and have already taken appropriate measures. Our experts can check these for you and confirm if they are good enough.

 

Check-4-Hack

When it comes to IT security, prevention alone is no longer enough. Do not take any chances. We can check whether your infrastructure has already been compromised and identify any vulnerabilities.  

 

Social engineering audit

We simulate a criminal hacking attack. Our IT security experts take on the role of a hacker in order to test both your system and staff for any weak points. 

 

IT security training

You can have the best IT security strategy in the world, but it is useless if your employees cannot recognize attacks like phishing emails. Our security training seminars use phishing simulations to prepare your employees for potential attacks.