360-degree analyses360-degree analyses

360-degree analyses

If you want to have your current security level evaluated in its entirety by external, independent experts, you have come to the right place. A 360-degree analysis is the ideal context for this. It includes a one-day workshop, followed by an analysis and documentation.

The 360-degree analysis aims to gather information on the existing applications, IT infrastructure, protective measures that have been taken and IT-security-relevant processes in an overall context to identify and evaluate potential attack vectors and vulnerabilities.

In line with common standards, the following topics will be covered, for example:

  • Protection of business-critical applications
  • Network security
  • Security in the production environment
  • Security of endpoints like clients, servers, smartphones, printers, …
  • Protection from malware
  • Secure IT operations (administration concept, permission assignment, vulnerability and patch management, security monitoring, etc.)
  • Security in the cloud
  • Security management (ISMS, policies, risk management, service provider management, etc.)
  • Information protection
  • Secure development
  • Physical security

There is no rigid pattern for the 360-degree workshop. Our consultants are also happy to consider and discuss your current key topics and questions.

Following the workshop, we will prioritize the findings, and we will determine and document technical and organizational recommendations for possible measures.

On request, the results can also be used to carry out a detailed structured threat and risk analysis.

The results of the 360-degree analysis will show to security managers the possible fields of action according to priority.