This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

  • Whitepaper
  • Data Center Security, Identity and Access-Management

Avoiding the 5 most common data security problems

Read the white paper to learn how to avoid common causes of security breaches in increasingly decentralized and complex IT environments.

Data security requires the highest priority in companies - for good reason.

Especially when the IT environment becomes more and more decentralized and complex, it is important to understand that many security breaches are avoidable. While security risks and objectives can vary widely from company to company, companies often make the same common mistakes when tackling data security. In addition, many company executives often accept these mistakes as normal business practice.

There are many internal and external factors that can facilitate successful cyber attacks:- Shifting network boundaries
  • Larger attack surfaces through more complex IT environments
  • Increasing demands on security procedures through the use of cloud services
  • Increasingly sophisticated procedures of cyber criminals
  • Continuing shortage of skilled workers in the field of cyber security
  • Lack of employee awareness of data security risks

Learn more in the whitepaper about the five most common problems regarding data security in companies and how to avoid them.

A document on this subject is available in German. Would you like to read it? Switch to the German view.

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.