11
Cyber Security Audits, Compliance and technical Advisory
Key Facts
  • Technical Compliance Audits (NIS2, ISO/IEC 27001:2022, TiSAX)
  • Technical Security Advisory, Security Concept Advisory
  • Security Audit
Categories
Application security Hardware security Mobile security Network security Physical IT-security Web application security Cloud (computing) security Endpoint security Penetration tests APT protection Counter-intelligence Threat analysis Awareness Education / training / qualification Consulting IT security

Product information

Cyber Security Audits, Compliance, and Technical Advisory – from a single source. We combine deep technical expertise with regulatory assurance to make your environment measurably more robust, auditable, and future-proof.

Service components

• Audits (Hardening & Architecture) o System and platform hardening: Windows/Linux, Active Directory/Entra ID, M365, network/segmentation, EDR/SIEM, backup/recovery

o Cloud security reviews: Azure, AWS, GCP (identity & access, landing zones, networking, logging/monitoring, keys/secrets, PaaS/IaaS)

o Container and platform stacks: Kubernetes, Docker, container registries, supply chain (SBOM, image scanning), CI/CD pipelines, IaC

o Benchmarks & best practices: CIS Benchmarks, Azure/AWS/GCP Security B ...