Services

  • We are defining and revising your security architectures - protect - detect - react
  • We are analyzing potential risks (penetration tests)
  • We are supporting you during IT audits
  • We are doing incident response (intrusions, misuse, theft)
  • We are carrying out legislation compliant and scientifically based forensic investigations
  • We are monitoring publicly available information via open source monitoring
  • We are monitoring and analyzing your log files