Cyber Security Solutions
Berechtigungssicherheit: ARM,IAM,IDM,IGA
NISII, DSGVO, DORA,§391 V, u.a.
PAM-Priveleged Access Management
Zugangsberechtigungen: Password,
SSO, MFS+Keys
Security Audit Schwachstellenmgt + Penetrationtesting
Asset- + Patchmanagement
SIEM
Mail- + Daten-Sicherheit
Moderne Cyber IntelligenceTechnologien DNS- Whitelist Filter
Endpoint Protection+
Token (+MGT)
ISMS
Notfallmanagement
SEM + HCO
Managed Network Detection and Response
Security Awareness