IT Security

Offering a holistic approach on information security in general and bringing awareness and how-to of a multi-layered security concept and strategy to our customers gets reflected in our security related consulting services portfolio.


  • Advanced Malware and Threats

    Writing zero-day malware can be done easily by almost everyone. New threats arise every day and standard signature based security…

  • Content and Application Security

    Securing the application and content layer becomes more and more challenging as threats as well as corporate application usage changes…

  • Data Loss Prevention

    Mitigating leakage or loss of confidential and sensitive data is an important and crucial vector when setting up information and…

  • Email Security

    Targeted social engineering, spreading spam e-mails or infected attachments with zero-day exploits compromising your computer network can be addressed. Designing…

  • Endpoint Security

    Securing the endpoint as one of the main attack vectors gets a more central part in IT security. Bringing in…

  • Enterprise Firewalling

    What is good enterprise firewalling? Absolutely way more than placing a security system on the perimeter. Designing network based security…

  • Enterprise Security Architecture

    Designing single purposed systems or primarily dealing with products for improving information/network security such as firewalls or endpoint-protection is loosing…

  • Secure Mobile Access

    Providing access to remote workers, employees traveling abroad or partner companies being involved in everyday business is mandatory in today's…

WordPress Cookie Notice by Real Cookie Banner