All-round security for your company.

Enterprise Security & IT Resilience.

Are you interested in further information? Contact us now without obligation.

Test Security Informationen

Information Security Management System (ISMS) - Services

Your data deserves the best protection. We support you with the following services:

  • Consulting & planning
  • Risk assessment
  • Support for successful audit
  • Training and sensitization on the topic of IT security
  • Business Contiunity Management (BCM)
  • Support for change to ISO 27001:2022
privacy_tip
ISMS

Development and continuation of an ISMS!

  • Support in the development and implementation of a customized ISMS according to ISO 27001
  • We identify the risks that could endanger your data
  • Together with you, we prepare the audit implementation
  • Development of an ISDS concept
emergency
BCM

Conceptual and oriented approach to emergencies!

  • Analysis of your critical processes
  • Creation of a BIA - Business Impact Analysis
  • Recovery plan for emergencies and crises
  • Creation of a communication plan
  • Support in exercises of planning and strategy.
school
Awareness

Knowledge is half the security!

  • Support for awareness campaigns for e-learning tool
  • Training in relation to ISO 27001
  • Awareness and training on corporate risks
  • Training on topic request on your part
  • Training for all areas
Yes, I want to know more!

contact us now

Content Governance, Compliance, and Protection by Kiteworks.

Kiteworks helps IT executives securely share confidential corporate data with customers, suppliers, and partners. It does this by unifying visibility and security across multiple communication channels, including email, file sharing, mobile devices, web forms, managed file transfer, and SFTP.

With Kiteworks customers achieve unified, tracked, controlled, and secure:

email

Email

that makes sending encrypted, compliant messages and attachments easy from wherever users work, on the web or mobile, in Outlook or in enterprise applications.

file_upload

File Sharing

that protects sensitive content and enforces compliance policies, yet increases user productivity and collaboration as business owners manage content, folders, invitations and access controls.

drive_file_move

Automated File Transfer

through MFT, SFTP and SMTP that streamlines secure large-scale file transfer operations and automates secure and flexible business processes.

Yes, I want to know more!

contact us now

Most effective actions to improve cyber resistance with Saporo

Saporo helps organizations anticipate and defend against attacks.

Saporo improves your cyber resilience by prioritizing and reducing the risks associated with your system and user access. Saporo knows where attackers can go once they're in, and figures out which paths and routes attackers can take to get there. Saporo helps organizations improve their security posture and harden their configurations to increase their resistance to attack.

Protect your critical assets, uncover your blind spots.

sort_by_alpha

Order in Chaos.

Saporo helps you understand your environment from the perspective of an attacker. Identify and address attack paths, misconfigurations and other vulnerabilities by continuously mapping assets, discovering risks, and prioritizing remediation efforts for IT and security teams.

settings

Simple to install, simple to use.

Saporo is built to be fast and scalable. Results are available in as little as one hour. Our solution is agentless and only requires read access. We understand that some industries and companies have different constraints or preferences. Saporo can be fully installed on-premises or in the cloud.

local_police

Attackers love complexity. Defenders need clarity.

Attackers need to find only one attack path, defenders need to find all of them.
Identifying all potential attack paths in large and dynamic environments is impossible using manual methods.
Saporo recommends changes to improve the resilience of your organization and close attack paths by level of risk and exposure.

Yes, I want to know more!

contact us now

The next frontier for detection and response.

Falcon endpoint protection replaces complex and ineffective antivirus solutions with a centralized, cloud-based solution. This combines next-generation antivirus (NGAV), endpoint detection and defense (EDR), device control, vulnerability assessment and IT hygiene.

3 reasons to choose Crowdstrike

Better Protection

Get protection across the entire threat lifecycle by combining machine learning, artificial intelligence, behavioral analytics and proactive threat hunting in a single solution - all powered by Threat Graph, the security industry's largest cloud analytics platform.

Better Performance

A single lightweight agent works everywhere, including virtual machines and data centers - providing protection even when endpoints are offline.

Better Value

Get better protection while eliminating on-premise infrastructure and consolidating your endpoint agents with an extensible platform that grows and adapts to your needs without adding complexity.

Yes, I want to know more!

contact us now

Are you interested in additional information?

You are welcome to contact me directly.

[Translate to Englisch:]

            
Gero Stautmeister

Head of IT-Infrastructure & Security, CISO

phone+41 79 797 6743

Or you can use our contact form.