Main focus

Schwerpunkte Icon

Main focus

Our current focus subjects

Protection control technology

We align your ISMS to technical effectiveness for effective protection. Our goal-oriented solutions maintain their effectiveness even in the event of operational changes. We always keep their special framework conditions in mind when implementing security in IT and Operation Technology (OT).

IT-Security catalogue

We help you meet the regulatory requirements of the IT security catalogue published by the BNetzA and optimize the technically effective security of your control technology. The framework conditions and the actual security situation serve as a basis for this.

General Data Protection Regulation (GDPR)

What does the General Data Protection Regulation mean to you and what do you need to consider? We develop and document customized solutions together with you, with which you not only regulate the processing of personal data and other data protection requirements, but also implement technical and organizational measures in such a way that you increase your actual security level and ensure technically effective security.

IT-Security law

We support you in technical security, so that you do not have to report any notifiable (near) incidents. With security monitoring and incident management you remain permanently protected and counteract the reporting obligation to the BSI.

Industry 4.0

Industry 4.0 resolves deterministic solution thinking and requires fundamentally new architectures, especially after the conversion to Cyber Physical Systems (CPS). We help you to plan and implement the introduction of Industry 4.0. In doing so, we take into account all new relevant aspects that are necessary for appropriate IT security.

Technical Compliance

We show you how to not only comply with the technical compliance of your ISMS according to ISO/IEC 27001:2013, but also how to achieve a security level that is appropriate both economically and in terms of risk. Our extended test method takes all relevant processes into account.

Working method

We offer you technically effective IT security and informative security checks. Our services are manufacturer-independent, standards-based and objective. Our solution packages are goal-oriented and tailored to your needs.