Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


IT Security Consulting


Consulting IT security Business continuity Threat analysis

Key Facts

  • IT Protection Measures
  • IT Security Concept
  • Vulnerability Scan

Product Description

How secure are your IT systems?

  • Do your IT systems meet the latest requirements?
  • Are the technical protection measures implemented according to your security level?

As part of a functioning ISMS, regular auditing of IT systems and concepts is part of the fixed agenda. With our experience from many customer projects, we are happy to support you.

Vulnerability scan of your IT systems

  • Are your IT systems secured in line with the risks? We check the status of your IT systems and network components with special software.You decide which devices / systems we check in detail.We coordinate the results with you and give you practical recommendations for action. According to your own risk assessment, the recommendations for action can be implemented.
  • This vulnerability scan is NOT a penetration test: everything we do is agreed with you in advance.
  • Our recommendation: Penetration tests are the supreme discipline. Before you dare to do a penetration test, the basics of your IT security should be implemented.

IT protection measures

  • Many standards and specifications for IT security provide recommendations for increasing your security level.We support you in selecting the appropriate IT protection measures.
  • At this point, a risk-oriented approach is important to us. We develop IT security concepts with you.
... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.