Offering a holistic approach on information security in general and bringing awareness and how-to of a multi-layered security concept and strategy to our customers gets reflected in our security related consulting services portfolio.
-
Advanced Malware and Threats
Writing zero-day malware can be done easily by almost everyone. New threats arise every day and standard signature based security…
-
Content and Application Security
Securing the application and content layer becomes more and more challenging as threats as well as corporate application usage changes…
-
Data Loss Prevention
Mitigating leakage or loss of confidential and sensitive data is an important and crucial vector when setting up information and…
-
Email Security
Targeted social engineering, spreading spam e-mails or infected attachments with zero-day exploits compromising your computer network can be addressed. Designing…
-
Endpoint Security
Securing the endpoint as one of the main attack vectors gets a more central part in IT security. Bringing in…
-
Enterprise Firewalling
What is good enterprise firewalling? Absolutely way more than placing a security system on the perimeter. Designing network based security…
-
Enterprise Security Architecture
Designing single purposed systems or primarily dealing with products for improving information/network security such as firewalls or endpoint-protection is loosing…
-
Secure Mobile Access
Providing access to remote workers, employees traveling abroad or partner companies being involved in everyday business is mandatory in today's…