ja_mageia

Deutsch (DE-CH-AT)English (United Kingdom)
  • How can attacks be avoided?


    ✓ Ensure essential controls are met
    ✓ Find, track, and assess data
    ✓ Monitor event logs

  • What do attacks have in

    common?


    75% were not discovered
    83% were not highly difficult
    87% were avoidable

  • How do breaches occur?

     

    62% system error
    59% hacking and intrusions
    31% incorporated malicious code
    22% exploited a vulnerability
    15% physical threats

  • Who is behind data breaches?

     

    73% resulted from external sources
    18% were caused by insiders
    39% implicated business partners

     

     

     

Home Services Contract Management
Contract Management

"A Management team cannot claim to be in control of its business if it is not in control of the con-tracts the business depends on."
GARTNER SPA -19-4555, 20.3.2003

Service agreements are a basic requirement to ensure a secure and long-term support. But it is increasingly difficult to monitor the growing number of these. Our Contract Management System helps you to supervise your service agreement. Expiring agreements are sent to you automatically as a reminder. Our service team naturally assumes the endorsing of new agreements.

The advantages speak for themselves:

  • Central data management for all agreements
  • Simplified and standardised analysis
  • Improves planning through a transparent
    contract basis
  • Administration, retrievability and control
  • Automatic notification
  • Financial planning
 

Quick Links

 
A one day security check for your infrastructure.
 
 

IP Vulnerability Scan


Attacks on your external systems to determine potential risks.