Consult us and enjoy the security standards deployed by DAX-listed companies – customized to your environment.
Our range of services in information security:
IT security governance
Goal: The active management of the ever-increasing requirements on IT security is crucial to your enterprise, to prevent such damages as image loss, competitive disadvantages or contractual penalties to name a few.
Challenge: The security demand of all relevant assets (e.g. design data, supplier prices) is to be evaluated for various threat scenarios, based on the asset type, confidentiality, integrity, and availability parameters.
Value: You identify the security demand of high-priority data and the required security measures. We conduct a professional information security monitoring, which allows you to initiate appropriate IT measures and to determine the remaining risks.
Goal: An indispensable prerequisite for the implementation of the required security level, is to know which business processes handle mission-critical data, so-called protection objects. By applying a methodical approach, we jointly identify the critical protection objects and subsequently conduct a qualitative and quantitative assessment.
Challenge: The security demand of all critical assets (e.g. design data, supplier prices) are evaluated for various threat scenarios, based on the asset type, confidentiality, integrity, and availability.
Value: You determine the security demand of high-priority data and the required security measures. We conduct a professional information security monitoring, which enables you to initiate appropriate IT measures and to identify the remaining risks.
Data protection & IT compliance
Goal: We assist your company in fulfilling the requirements imposed by EU General Data Protection Regulation and support you in structuring your IT compliance guideline to cooperate with your customers, suppliers and Partners securely.
Challenge: A whole array of personal data is being used in your business processes, both by your own employees and your customers or suppliers. The legal basis for the protection of these data are current statutory regulations. We assist you in identifying the necessary technical and organizational measures, assess the sufficiency of measures already taken and accompany you during establishment and implementation process of an IT compliance guideline that suits your company’s unique requirements.
Value: We ensure that you fully comprehend the relevant requirements of the Federal Data Protection Act and international data protection law, and establish an action plan based on the conducted GAP analysis. Following your compliance specifications and communicating transparently is more than just image management – it’s also an opportunity to acquire new customers and prevents legal penalties.
Goal: All data processed in IT systems and/or its transmission channels are to be protected against unauthorized access, manipulation or loss, in accordance with their security requirements.
Challenge: Each system has unique IT security requirements. A criticality analysis of a planned IT system allows us to assess how the information and data within that system affects the required security measures, at an early stage. For example, uncritical data can be made available via Internet to a larger group , while more sensitive corporate data will require a two-factor authentication and a secure transmission channel. The first step is to clarify the protection requirements of the data processed in IT systems in order to adequately protect the IT systems, depending on the criticality of the data. It is crucial to identify the security requirements of the data being processed in the system, to downstream appropriate security measures.
Value: We ensure that data in your IT systems are being processed according to the required security standards.
IT risk management
Goal: You identify your IT risks in terms of probability and its’ damage level, and have implemented a procedure for the active management of IT risks in your company.
Challenge: Almost everything in modern companies is IT driven. Dependence on IT is constantly increasing, as is the complexity of IT systems. IT risk management identifies, analyzes, evaluates and monitors the various IT risks detects economic threats, and provides countermeasures or emergency action plans for different scenarios.
Value: Our experienced security consultants and IT auditors help you build a sustainable IT risk management system.
Security audit & certification
Goal: We assist you in optimizing your company’s IT security by strengthening the protection of your company’s critical data through appropriate security measures.
Challenge: Companies often have no clear overview of the current IT security level. By carrying out IT security audits, our experienced security consultants establish the required transparency for the management. If necessary, we also advise and assist you in implementing the necessary measures to achieve the desired IT security level.
Value: Years of experience of our certified IT security auditors allow you to establish the desired transparency level regarding the IT security status of your company.
Do you have any inquiries about information security?
Do not hesitate to call me at +49 176 5657 4165 or leave me a message here. I’d be happy to get in touch with you.
Head of Information SecurityE-Mail