Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 7 / Booth Number 7-234

Secure IT Infrastructures

Key Facts

  • Identification of individual protection needs
  • Setup of suitable architectures and topologies
  • Definition of test strategies and penetration testing

Product Description

Hardened IT infrastructures, along with trained employees, suitable security components and established process management (ITSM & ISMS), form the indispensable basis for the most secure local processing of your data as well as cloud services, aimimg at minimizing information security risks. Specifically, the safety-related hardening stands for the properties: always up-to-date, correctly defined, fully cataloged, largely automated, properly configured and reliably tested as well as constantly monitored. In order to permanently fulfill these high requirements for information security through proactive protection and a robust response capability for defense or damage detection and reduction, an integrated approach is necessary: from technical protection and organizational adjustments and permanent monitoring (functional and security monitoring) to the support of proactive activities and necessary responses. CONET adapts its security projects risk-based to the performance potential and depth of the customer environment, supports the transfer of know-how to the customer organizations and service providers and avoids lost efficiency in coordination and implementation through coordination by a competent single source. We offer you: • Identification of individual protection needs against security threats • Analysis, evaluation and optimization of the components of your IT infrastructures, networks, applications & systems • Definition and setup of suitable architectures and topologies • Selection and setup of optimized processes and tools for monitoring and incident handling • Definition of test strategies and tests (penetration tests, disaster recovery)
... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.