Cyber Security Solutions
PAM - Privileged Access Management
Berechtigungssicherheit: IDM, IAM, IGA, SSO
BRM: Clean, Auditm MGT Beratung+Umsetzung: BSIG, NIS II, DSGVO,
DORA, § 391 SGB V, u.a. Zugangsberechtigungen:
SSO+Passwordsecurity+PW
MGT+MFA+Keytec ISMS + Notfallmanagement + BCM Risk-Management,
Risikoauslagerung MDR-NDR Network Detection and Response SIEM Security Audit +
Schwachstellenmgt +
Penetrationtesting Asset- + Patchmanagement Defenderbox E-Mail Monitoring+Security E-Mail Verschlüsselung +
Large File MGT Endpoint Protection +
RemoteMGT Cyber Intelligence Technik:
Threat Protection +
DNS-Whitelist Filter Notfallmanagement Security Awareness
BRM: Clean, Auditm MGT Beratung+Umsetzung: BSIG, NIS II, DSGVO,
DORA, § 391 SGB V, u.a. Zugangsberechtigungen:
SSO+Passwordsecurity+PW
MGT+MFA+Keytec ISMS + Notfallmanagement + BCM Risk-Management,
Risikoauslagerung MDR-NDR Network Detection and Response SIEM Security Audit +
Schwachstellenmgt +
Penetrationtesting Asset- + Patchmanagement Defenderbox E-Mail Monitoring+Security E-Mail Verschlüsselung +
Large File MGT Endpoint Protection +
RemoteMGT Cyber Intelligence Technik:
Threat Protection +
DNS-Whitelist Filter Notfallmanagement Security Awareness