Portfolio Category: Consulting and Training

Security Analysis and Auditing

Auditing information and network security is often brought in from either an organizational (e.g. ISMS) or a technical (e.g. Vulnerability Testing) perspective. Our approach is offering both sides of competences in performing ISMS performance evaluation, IT risk evaluation and management, gap analysis, BIA analysis and technical security assessments of web applications, server systems, whole networks and combined tests including social network and red team attacks.
Read more

Support and Troubleshooting

Root-cause analysis in case of repeating network or system problems has to be analyzed and design gaps have to be corrected and fixed. We are the partner in identifying, evaluating and fixing design or systems based network and security problems with over 20 years of experience on the field of a broad file of vendors and technologies in IT.
Read more

Training

Having two experienced trainers for Microsoft, HID Global (former ActivIdentity), Fortinet and Palo Alto Networks in our team, we are also setting a focus on delivering our experience and know-how to our customers by designing workshops and specifically fitted vendor as well as non-vendor related training on the field of information security. Starting with basic systems exploitation over designing multi layered and centrally managed network security to Microsoft server and infrastructure.
Read more

Consulting Services

Consulting with way more than just the goal of selling, designing and implementing a product or system. We want to get our customers awareness, deeper knowledge and then providing concepts for addressing challenges in IT security and infrastructure while still considering being compliant and oriented to best-of-breed and applicable standards.
Read more

WordPress Cookie Notice by Real Cookie Banner