11
  • Hall 7A / Booth Number 7A-120
E-Mail Security
Key Facts
  • Assessment of protection needs
  • Protective measures & compliance
  • AI security concept
Categories
Mobile device managment Mobile security Network security Email security Endpoint security Penetration tests Risk analysis and management Vulnerability and patch management Backup solutions Business continuity Firewalls Awareness

Product information

Artificial intelligence is not only changing business processes – it is also expanding the attack surface of your IT landscape. Our structured approach to the secure introduction of artificial intelligence provides information security officers with a basis for securely planning, operating and monitoring AI systems. From determining the protection requirements of your use cases to technical and organisational protective measures and compliance requirements, our AI module provides practical guidelines that can be implemented directly. This allows you to maintain control over data flows, prevent unwanted model manipulation and comply with regulatory requirements such as the EU AI Act, as well as being compatible with BSI IT-Grundschutz and ISO standards 27001 and 42001. Take the opp ...