Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 7A / Booth Number 7A-126

Security Review


Cloud (computing) security VoIP security Network security Mobile device managment Application security

Key Facts

  • Concept Review, Source Code Review, Configuration Review
  • Firewall Rules and Zone Concept Review
  • Hardening Check

Product Description

During a review, we focus on the security design and specific security components including configurations or source code. You will receive a second opinion from our analysts. Concept Analysis We analyze your concepts and identify factual and potential vulnerabilities. You can incorporate our recommendations for improving the overall security into the implementation. Evaluation on Defense System With reasonable effort, we examine the resilience of your information technology landscape against cyber incidents. The focus is on prevention, detection and response. For example, we check remote access or whether backups are sufficiently protected. We therefore rely on current attack patterns and the corresponding countermeasures. Evaluation of Source Code Our analysts manually evaluate critical components or specific security-related features of your application’s source code. This allows us to check the code for logical errors, which an automated scanning tool is not capable of doing. Cloud and Configuration Analysis Securing cloud infrastructures (for example, Microsoft Azure, Amazon Web Services and Google Cloud Platform), Internet traffic inspection, proxies, web application firewalls, spam filters and other security components is complex. Default settings and thus insecure configuration are the norm. We therefore review these configurations and make suggestions which enable your IT professionals to implement secure best practices and raise the bar against adversaries. Hardening Test We check your Windows and Linux operating systems for shortcomings and suggest improvements so that you can deploy a solid and secure base image. Exposed systems such as Active Directories and mobile devices are also particularly analyzed in detail.
... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.