Your individual Security Challenges explained straightforwardly

We analyse your IT environment in detail and identify your potential for improvement.

This is how we proceed

Based on the specifications of NIST and BSI, we have developed a sound approach with which we can provide you with insights into your IT environment and the possible preventive measures against potential cyber incidents.

The Challenge

Only if we know your environment and which measures have already been implemented can we define the most effective protection options for you and evaluate them. A structured approach is essential if no «blind spots» are to remain.

The approach

Various publishers have developed standards that can be used to assess IT environments and IT security measures. Examples include the NIST Cyber Security Framework, the BSI Basic Protection Catalogue or the well-known ISO 27000 family of standards.

All of these frameworks provide a structured approach to comprehensively assess an IT environment or parts of it (such as IT security) and prioritise problem resolution.

Our service

Based on the NIST Cyber Security Framework and the BSI Basic Protection Catalogue, we have developed a catalogue of comprehensive assessments. Depending on the circumstances and areas on which the focus is to be placed, we set different priorities.

We find the right assessment for you and your company in a joint discussion. Often a combination of different assessments is also helpful, which is possible for us without any problems!

We round off each assessment with a chapter on possible solutions to help you address any weaknesses that our analysis has highlighted.

Realisation:
Usually at your premises, time required on your side approx. 2 hours

Insights:
Focus on your IT infrastructure & system landscape
• Pointing out outdated systems
• Recognition of over-provisioning
• Define missing system components
Realisation:
Usually at your premises, time required on your side approx. 2 hours

Insights:
Focus on processes & measures
• Analysis of the existing organizational environment
• Identify urgent needs for cybersecurity
• Definition of the steps for best practice
Realisation:
Usually at your premises, time required on your side approx. 2 hours

Insights:
Focus on IT security technology
• Identification of Insufficient IT security technology
• Identify systems and configurations that should be implemented
• Definition of the steps for best practice

Further contributions on the topic

Read more about IT security in our Insights.

Your contact

Do you have any questions? We are available to you with pleasure for a personal conversation.

Marius Dubach
IT Security Consultant

Achieve your goals

Let's talk about how you can benefit from our IT services and what a new scenario for your company might look like in specific terms.