Cyber Security Solutions
Berechtigungssicherheit: ARM,IAM,IDM,IGA
NISII, DSGVO, DORA,§391 V, u.a.
NIS II + PAM
Zugangsberechtigungen: Password,
SSO, MFS+Keys
Schwachstellenmanagement+Penetrationtesting
Asset- + Patchmanagement
SIEM
Mail- + Daten-Sicherheit
Moderne Cyber IntelligenceTechnologien DNS- Whitelist Filter
Endpoint Protection
IOT Security
Notfallmanagement
SEM + HCO
Managed Network Detection and Response
Security Awareness