Offer
·1 min
Worried about information security?
Bad news again about thousands of hacked accounts?
Are yours included?
Fortunately, only the large platforms have this problem.
Or maybe not?
Are you constantly bombarded with new requirements that you had never heard of until yesterday?
DORA? NIS2? KRITIS?
Supply Chain Act? Cyber Resilience Act?
Are your customers asking you “absolutely necessary” certifications, audits, or questionnaires?
ISO 27001? ISO 27017? SOC 2? C5? CSA STAR? CC? CIS?
Then let’s talk about solutions that take a lot of work off your hands.
Protection according to BSI IT-Grundschutz
·2 mins
You want to protect your IT. Without a flood of paper. The offer for customized guidelines and standards is on the table.
Why reinvent the wheel?
Find out how IT Grundschutz (baseline protection) efficiently secures your IT…ISMS processes and awareness training
·2 mins
Your policies are perfectly formulated. But nobody knows them.
The video training courses to raise awareness are a compulsory program with no effect.
Is information security a matter of course for you?
Read how ISMS processes contribute to this…Concepts and systems architectures
·1 min
The new tool is implemented. The chaos begins. Interfaces? Not a chance. Introduction costs? Amazingly high.
Do you have a well-thought-out concept and a sustainable architecture?
Discover how stable architectures emerge…Structural analysis and system documentation
·2 mins
Your IT is up-to-date. And up to any adaptation. Only your expensive team of consultants knows how the configuration works.
Is your documentation understandable and reduced to the core?
Find out how transparent structures can make your work easier…Software revision and process automation
·2 mins
The new feature is ready. Suddenly the deployment takes twice as long. The critical bug only becomes apparent to the customer in production.
Sound familiar?
Read how review and automation can strengthen your offering…Security-by-Design and structural optimization
·2 mins
Launch in three days. Just quickly get the “OK” from the InfoSec team.
The data flows look like the Okavango Delta. And are only documented in the code. That reminds of pasta.
Now the code review takes forever?
Find out why security and simplicity are a dream team…Pricing
·2 mins
Let’s talk money. Up front. No games.
Do you have a problem with the Pay Transparency Directive?
Not me.
We can do business under these conditions…