ja_mageia

Deutsch (DE-CH-AT)English (United Kingdom)
  • How can attacks be avoided?


    ✓ Ensure essential controls are met
    ✓ Find, track, and assess data
    ✓ Monitor event logs

  • What do attacks have in

    common?


    75% were not discovered
    83% were not highly difficult
    87% were avoidable

  • How do breaches occur?

     

    62% system error
    59% hacking and intrusions
    31% incorporated malicious code
    22% exploited a vulnerability
    15% physical threats

  • Who is behind data breaches?

     

    73% resulted from external sources
    18% were caused by insiders
    39% implicated business partners

     

     

     

Home Consulting
Security Consulting

In today's Internet and e-Commerce age an increasing proportion of procedures critical for a company are being controlled or influenced by computer systems. The connected interest of a company in the availability of its computer environment requires from the IT and personnel responsible for the computers have a complex understanding of the components used and their dependence among each other. Even the most minor system failure or data loss can threaten the existence of a company. The recognition of these complex coherences requires many years of expert knowledge in all IT areas.

From a manager's perspective, the subject of security is not only becoming more critical, but also due to the increasingly stronger influence of the legislature. Issued guidelines such as SOX (Sarbanes Oxley Act), FDA (Federal Drug Administration), KonTraG and Basel II define binding procedures for the use of IT-Security, which are however are not implemented in most companies as required in order to fully comply with these requirements.

We wish to support you and have therefore defined a focussed service, which we offer for each required phase, in order that you quickly develop the necessary knowledge, define processes and thereby increase your IT security in the long term.

 

Quick Links

 
A one day security check for your infrastructure.
 
 

IP Vulnerability Scan


Attacks on your external systems to determine potential risks.