With the increasing digitization of companies, IT security incidents and data leakage are a daily occurrence nowadays. The elimination of these security holes is now occupying entire departments in companies. Every incident is associated with bad press, especially when it comes to sensitive customer data.

We will help you to design your IT systems in a secure and future-oriented way, so that risks will be minimized. By regularly checking your systems, we can identify weak points before others do and eliminate them as quickly as possible.

We focus ourselves on complex systems of software, hardware and network technology. Through many years of experience in various fields and industries, we can provide you with optimal support in system setup and operation.

IIoT, Smart Metering, Industry 4.0

Of course, you can also count on our qualified know-how during the course of your IoT or Industry 4.0 project. No matter if we adapt our existing solution modules to your individual needs or create your customized solution within the scope of an individual development, we always follow a proven and successful procedure to realize your project success.

Common security-related questions

Each project has its own specific challenges. Nevertheless, over the course of many projects, a catalog of questions has been established which is always useful. We have compiled some questions here as examples:

  • How is the system rolled out in the field?
    • When rolling out equipment, there are always questions about provisioning, secure supply chain and dismantling/scrapping.
  • Which (legal) requirements must be fulfilled?
    • Is there an ISMS? Is the company regulated by standards (ISO27001)? Are we talking about a critical infrastructure?
  • How is the monitoring system implemented?
    • In many projects, security is an important aspect – although compliance with self-imposed standards is neither technically nor organizationally monitored. We help establish suitable monitoring systems and processes.

ISO27001 and ISMS

In order to monitor the increasingly complex systems and to handle security incidents correctly, the introduction of a management system for security issues (ISMS) is recommended. ISO 27001 defines the requirements of the management system and specifies the requirements for the introduction of suitable security mechanisms. This ISO establishes information security including IT security in a systematic and structured manner. We would be pleased to support you in the introduction of appropriate processes and systems. Please do not hesitate to contact us!

Contact us for competent and flexible support!