Uncovering weaknesses and process and structural problems
- RED-Team Deepdive
- Information Security Management
- Security Audit
- Security Architecture Review
- IT Risk Management
- Access Control
Anyone who wants to hack a company tries to find a so-called kill chain and use it to establish their criminal activities. What does that mean? A few steps are required before the "Kill chain complete!" can be said. First of all, it must be possible to identify the infrastructure system and penetrate the system ("IN"), for example via social engineering such as phishing emails. Then the attackers must expand their access rights within the company network ("THROUGH") in order to - last but not least - cause damage ("OUT") that generates money, such as blackmailing the company through ransomware (data encryption or data sale).
In our IT strategy, we address the various facets of a cyber attack and build a universal "cyber block chain" to detect, respond to and prevent the various techniques and tactics of an attack. (PREVENT, PROTECT, DETECT, RESPOND) You can find an evaluation of current attack methods in our Cyber Security Report 2024.
Speak one language. Pulling together. Finding solutions together. Our cyber security strategy.
We are one of the leading cyber security companies in the DACH region. Around 300 multi-certified IT security specialists in various powerful teams work around the clock on security projects or analyze security-relevant incidents, the trend and complexity of which are increasing. Constantly changing requirements, new threat situations and artificial intelligence influence the way cyber security is viewed. Our strategy is to combine companies' existing infrastructures with modern solutions in order to be protected against the current threat landscape.
A common language
We speak "one language" across all technically and strategically necessary specializations and see and deal with cyber security from the perspective of both the defenders and the attackers.
Clear strategy
We have a clearly defined strategy for protection and defense and assess threats according to the security maturity level of our customers.
Cyber Defense Center
Thirdly, we have a powerful Cyber Defense Center. A proactive service that goes beyond a traditional security operations center, actively hunting threats and tracking attacks right through to the operational technology (OT) world.
Purple Team
We have our own RED team ("attack simulation") and BLUE team ("defense") and pursue a symbiotic PURPLE strategy.
Operational security and supply chain security
We are specialists in all security-relevant areas of a company, from classic IT to IOT, operational technology and supply chain security.
Technology partner
We work with the world's leading technology providers and expand their product portfolio with our services.
Foresight
We anticipate potential new strategies and updated approaches by cyber criminals.
Request now