11
  • Hall 7A / Booth Number 7A-232
Security Review
Key Facts
  • Concept Review, Source Code Review, Configuration Review
  • Firewall Rules and Zone Concept Review
  • Hardening Check
Categories
Application security Mobile device managment Network security VoIP security Cloud (computing) security

Product information

During a review, we focus on the security design and specific security components including configurations or source code. You will receive a second opinion from our analysts. Concept Analysis We analyze your concepts and identify factual and potential vulnerabilities. You can incorporate our recommendations for improving the overall security into the implementation. Evaluation on Defense System With reasonable effort, we examine the resilience of your information technology landscape against cyber incidents. The focus is on prevention, detection and response. For example, we check remote access or whether backups are sufficiently protected. We therefore rely on current attack patterns and the corresponding countermeasures. Evaluation of Sou ...