Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Service

Hall 7 / Booth Number 7-419

360° Security Assessment

Key Facts

  • Holistic approach on relevant factors
  • Documentation of current situation
  • Reporting and review of status incl. concrete actions

Product Description

360° Security Assessment provides you with comprehensive advice. Together with you, we take stock of the current situation in your (IT) security environment. In various specialist workshops, your IT is analyzed from all sides and checked for security requirements. Backup, network security, identity management and security management are all part of the assessment. With subsequent recommendations for action, we discuss the security-relevant topics of your individual IT corporate strategy together with you. KRITIS - Healthcare and companies with special public interest as part of the critical infrastructure in Germany. The analysis of the existing IT security environment is relevant for companies of all kinds. Especially in the KRITIS environment we can advise you comprehensively on your IT security and implement the necessary projects with you to secure your business relevant information & data. The IT Processes workshop primarily deals with the review of the basic structure of your IT environment. - The basic structure of your IT environment - The existing inventory & IT documentation, - The IT processes, such as change and incident management, BCM - The existing governance and management system structures (ISMS) In the IT security workshop, the following sub-areas are analyzed, among others: - Network infrastructure / network services - Firewall - Application protection - EndPoint Protection - Vulnerability Management - Remote Access The Identity Management specialist workshop covers the following areas, among others: - Active Directory - DHCP - DNS - Public Key Infrastructure - Exchange In the Backup specialist workshop, our experts comprehensively analyze your backup environment. This includes among other things: - Documentation of the backup environment / solution - Emergency documentation - Backup strategy / media disruption - Ransomware / K-case planning - Technical questions about the backup solution
... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.