Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 6 / Booth Number 6-340

IT security audit

Key Facts

  • IT security audit perfected for medium-sized companies
  • Clear summary for the management
  • Identify real security flaws in your IT

Product Description

 We have used our many years of experience from IT audits and summarized the BSI's basic protection catalogues in almost 200 questions. The essence was preserved. Our audit includes all topics that are relevant for IT security in medium-sized companies: Data protection, antivirus, employee awareness, data backup, firewall, servers, endpoint security, switches, patch management, monitoring, IT security management, etc. We have also subjected the existing standard audit procedures to a pragmatic revolution in terms of approach, thus creating a functional solution for SMEs. Instead of first inventorying every PC, every software and license, every line and every network device, then carrying out a protection needs analysis and risk analysis over days and weeks, only to always recommend the same measures in the third step, we pull it all up from the back: On the basis of our questionnaire, we examine the implementation of recommended measures – suitable for MEDIUM-sized companies and practice-oriented. As a result, you will not only receive a defect report from us. Our report also contains a clear summary for the management, graphically prepared and compressed with percentage results to the most important things. For each defect listed, we explain why it poses a risk and through which measures you can best counter it.
... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.