COMPETENCE

Data security

From the perspective of a specialist for infrastructure issues in the data center, the area of data security has more aspects than the (usually) associated link to the “classics firewalls, antivirus, IDS/IDP, etc.”. Our focus is also on the very “last line of defense”: the backup.

Protection of information (from a “security” perspective)

We can offer you the entire range of security measures to protect your data in company networks from internal and external access. Our employees' many years of know-how and proven specialists in the respective fields guarantee our long-term cooperation with you.

Protection of information (from an “infrastructure” perspective)

Only without a functioning backup are you really forced to pay the blackmailer (and he knows it!). The challenge is that the attackers usually stay longer in the company (approx. 160 days on average) and move from the point of entry to the better protected systems & data (lateral movement). Attacks on the backup are therefore carried out from the internal network!
If I now secure the backup with the same methods and processes as in the rest of the company network, failure is inevitable. The aim is therefore to break the "backup kill chain" and strengthen the resilience of the backup infrastructure as a whole.

The two areas are by no means in competition with each other, but must complement each other in the information network. However, we have found that security specialists plan, talk and think differently to their colleagues in infrastructure. With both our in-house expertise and our strategic partnerships, we respond to the 'gap' and serve both aspects for you, enabling us to look at the topic of data security from all sides.

Data security

Strategies, concepts & technical precautions to protect sensitive data from unauthorized access and modification - Defense against ransomware - PAM integration - Data security in backup concepts

  • Privileged account security & management
  • Backup risk assessment
  • Intusion prevention & detection
  • System & server hardening
  • Firewalls
  • Virtual private networks (VPN)
  • Endpoint protection