Security-Assessment for SME

Security-Assessment: the security check for your IT infrastructure

Do you know how well your SME is protected against hacker attacks? Let our security experts identify vulnerabilities in your IT system with a no-obligation assessment. The security check of your IT infrastructure and organisational processes provides a valuable starting point for improving your IT security.

Security analysis to facilitate targeted use of resources

SME IT security budgets are limited. An important first step, therefore, is to identify and evaluate risks so the scarce resources can be targeted to the biggest threats. Technical and organisational measures can also reduce the risk. Smaller risks can be accepted or delegated, depending on the likelihood of occurrence and the likely extent of damage.
Our Security-Assessment supports you in identifying the optimisation potential of your IT security as well as defining and prioritising pertinent measures. Take this opportunity to improve the IT security of your SME – before anything happens.

The benefits for you

  • Highlights vulnerabilities in your IT infrastructure (vulnerability scan)
  • Evaluates existing technical and organisational protective measures
  • Assessment report with recommendations on improving IT security

Your benefits

  • Specific plan for identifying and prioritising measures
  • Decision-making basis for planning security budgets
  • Competent, product-independent advice from Swisscom Security experts

When is it the right solution?

Would you like to understand the current state of your IT security so you can protect your operations? Do you need evidence to show management the IT security action required? Is the increasing number of cyber attacks giving you cause for concern about the current state of IT security in your company?

Use the findings from the Security-Assessment as a basis for further steps, such as developing or revising an IT security concept. The assessment report also provides guidance for investment planning decisions, such as prioritising measures and creating a security roadmap.

Why Swisscom?

  • 360  view: receive a comprehensive overview of your current situation.
  • Individual: receive recommendations for action designed around you.
  • Competent: benefit from our security experts’ many years of expertise.

Product overview

Additional option

Management presentation

  • A customised presentation of the assessment report for your management
  • In-person discussion with security experts at your premises


Get started with the Security-Assessment

The first step

Examining your IT infrastructure for vulnerabilities – an important first step to minimise cyber risks. Contact us for free, no-obligation advice.


The Security-Assessment in detail

The object of this technical analysis is to identify vulnerabilities in the hardware and software you use. Your IT infrastructure, including servers, network components, devices and software, is scanned for vulnerabilities and erroneous configurations for 10 days. The firewall, network and network zones are analysed and the latest versions of software and firmware checked, amongst other things. The results are incorporated into a comprehensive inventory report on the IT infrastructure.

The aim of the interview is to identify organisational and technical measures. It includes the following topics:

IT organisation
  • How are responsibilities for the operation, maintenance and protection of IT managed?
  • What guidelines have been defined?
IT security measures
  • What technical measures are in place to protect the network and ICT infrastructure?
  • How is the IT infrastructure protected from unauthorised physical access and natural hazards? 
Access protection
  • What policies and guidelines are in place to prevent unauthorised access to your systems? 
Data backup and business continuity
  • How is data backed up and how do you comply with legal retention obligations?
  • Can business activities be maintained in the event of an IT outage? 
Data protection
  • Does your IT infrastructure comply with data protection and other regulatory requirements? 
Raising awareness among employees
  • How are employees trained on security and data protection requirements?

Contact us in writing

Go to contact form