Consulting, Concepts, Reviews and Analyses
We have many years of experience in providing consulting for complex security environments as well as in designing and analyzing them.
Not only do we conduct regular risk analyses, but we also recommend measures, develop architectures and vendor-independent IT security concepts, and evaluate existing concepts and policies in the following areas, for example:
- Mobile devices and apps
- Web applications, portals and web services
- DMZ structures
- Intrusion detection techniques
- Setting up SOCs and incident response teams
- Implementation of EU-GDPR: Assessing the implementation of a catalogue of measures, such as CIS Controls or ISO 27002
We particularly place our focus on:
- ISMS consulting
- 360-degree analyses
- Malware protection concepts
- Risk analyses
- Gap analyses