Identify risks, monitor and evaluate processes and minimise risks.
It is only when you are aware of potential risks that you can minimise them and protect your ICT infrastructure effectively. As part of a workshop, you detect potential risks and discover which legal or industry-specific requirements you need to meet – and how you can do this in a practical manner.
Identify risks to your ICT infrastructure
Assess how your infrastructure and applications can be optimised
Assess whether your infrastructure and applications meet all requirements (FINMA, SOX)
Monitor and evaluate all IT processes in accordance with ISO 27002 (information security)
Identify which risks can be minimised
Secure access to all applications and data while on the move.
Access all applications and data anywhere at any time using your smartphone or tablet computer, without having to worry about security.
Develop mobile solutions that support all business processes
Evaluate risks, for example using structured risk analyses of mobile terminal devices
Analyse costs and benefits of the solutions based on the value of the data
Identify critical data and protect it with the ideal security solution
Employee workshops relating to mobile security
Identity & Access Management (IAM)
Centrally manage and control digital identities, roles and authorisations.
When you use services in the cloud, you need to have reliable and traceable information about who is using which services. Thanks to Identity & Access Management, you can centrally manage identities, roles and authorisations at your company and maintain an overview.
Sign, authenticate and encrypt using digital certificates
Identify instances and authentications quickly and securely
Authentication and authorisation simplify business processes
Roles are managed via the central self-service portal
Consulting for Identity & Access Management
Risk assessment for the communication and collaboration infrastructure.
Assess potential risks for your UCC infrastructure. This allows you to derive specific measures for effectively improving security. It also allows you to compare the current status with best practice examples or compliance requirements and reveal potential for optimisation.
Review with structured interviews on site
Security assessment with the help of recognised standards such as BSI basic protection (BSI Grundschutz) and Swisscom or Microsoft best practices
Analysis with recommended action
Interpretation and presentation of results
Compliance & Audit
Does your security strategy comply with the applicable guidelines and standards?
We examine your security strategy thouroughly as a neutral auditor. Following our security audit using internationally recognised methods and standards, you know where you stand.
Technical checks, such as penetration tests
Best practice comparisons
Security Architecture & Design
The basis for an integrated enterprise security architecture.
Would you like to define and set up an information security management system or extend your ISMS? We support you and comply with the recognised standards for information security such as ISO 2700x, ISO 13335 or COBIT when consulting. We attach particular importance to economic, audit-proof and measurable or verifiable measures.
Set up, check, assess, extend and optimise your management system for information security (ISMS)
Develop your security policy
Identify and classify assets
Define guidelines and standards
Business continuity management including disaster recovery