Consulting and Training

Combining advanced organizational and technical consulting services with troubleshooting and optimization of systems in place and providing vendor related training as well as for IT security in general is an integral part of the mindset we have. Listed below are our most considered areas when adding the layer above.


  • Advanced Threat Simulation

    Understanding what malware does, finding out the level of criticality and potential objectives of an attack has to be one…

  • Consulting Services

    Consulting with way more than just the goal of selling, designing and implementing a product or system. We want to…

  • Incident Response and Forensics

    In case of an information security related incident, response and backtracking of the reason and source is more than critical…

  • Penetration Testing

    Initial as well as continuous testing of systems and applications from a technical side should be integrated for every single…

  • Risk and Compliance

    Before looking at a security design or developing strategies in implementing systems for preventing incidents to happen, it is always…

  • Security Analysis and Auditing

    Auditing information and network security is often brought in from either an organizational (e.g. ISMS) or a technical (e.g. Vulnerability…

  • Support and Troubleshooting

    Root-cause analysis in case of repeating network or system problems has to be analyzed and design gaps have to be…

  • Training

    Having two experienced trainers for Microsoft, HID Global (former ActivIdentity), Fortinet and Palo Alto Networks in our team, we are…

WordPress Cookie Notice by Real Cookie Banner