Information Security
Our goal is to protect your corporate data and ensure its confidentiality, availability and integrity – suited to your security needs.
Get in touchproductportfolio
OUR Offer
Together with you, we ensure the confidentiality, availability and integrity of the data for which you are responsible. In this way, you not only secure your company's success, but also show your business partners and customers that you are also a reliable partner when it comes to "security".

Your sensitive data and systems need protection
Your company’s sensitive information can be found within processes, systems and on data carriers. That’s why you need an ISMS to consistently protect your systems and data. Implement security measures and a continuous improvement process in your company. We would be happy to support you in setting up and implementing an ISMS in accordance with ISO 27001 or BSI IT-Grundschutz.
An ISMS protects your company against:
- Outside attacks
- Damage to your reputation
- Significant loss of data
- Monetary losses
- Liability risks and lawsuits
- Corrupted integrity of data and information

Audit your security in moderation
Before an external audit by an accredited body, an internal audit must be performed for an ISMS. Our experienced consultants will be happy to support you in this. We ourselves operate an ISMS in accordance with ISO 27001. Thanks to our extensive experience, we know what auditors value and can adequately prepare for the external certification audit.
Our internal audit ensures:
- Comprehensive gap detection
- Extensive documentation
- Elimination of existing gaps before external audit
- Optimal preparation for external audit

Emergencies are not acts of god
What happens when your most important IT system goes down? How long can this system be offline before your company suffers significant damage? We can help you set up an emergency management system in accordance with BSI Standard 100-4.
Do you know how to prepare for an emergency?
- Running through possible emergency scenarios
- Documentation of individual emergency plans
- Emergency exercises for employee awareness
- Definition of responsible persons and actions for emergencies
- Smooth emergency management

Identify gaps in your security
Feeling overwhelmed by the flurry of regulatory, legal and customer requirements for information security? An individual gap analysis helps you identify the current status of your company with regard to your security. We’d be happy to assist you in preparing it.
Close the gaps and create security:
- Variance analysis
- Concrete recommendations for actionables
- Security awareness
- Increase the security of your company
- Protection against loss of data and reputation

Don't take risks
In the IT sector, risk management is extremely important. If you don’t think about security right from the start or monitor it continuously, your security risk is immense. Our security experts will work with you to ensure an environment without unnecessary risks. With the introduction of our tailor-made risk management, your company will benefit in the long term from a stable, secure and compliant IT, e.g. according to ISO 27005 and 31000.
Risks are calculable:
- Identification of information security risks
- Evaluation of potential impacts
- Definition of mitigation measures
- Design of a security risk management
- Integration into your existing risk management

Die sicherheit im blick und den rücken frei!
Der Grad an Informationssicherheit im Unternehmen ist abhängig davon, wie diese gelebt wird.
Schutz kostet Zeit und erfordert Expertenwissen. Ressourcen für dieses Thema sind im Unternehmen häufig sehr begrenzt. Hier können wir Sie als externer Informationsbeauftragter unterstützen und Ihnen somit den Rücken freihalten.
Gemeinsam haben wir Ihre Sicherheit im Blick:
- Planung, Überprüfung und Verbesserung von Sicherheitsmaßnahmen
- Kompetenter Ansprechpartner bei Fragen und Sicherheitsvorfällen
- Entwicklung Ihres Notfallmanagements
- Unkomplizierte sowie effektive Beratung und Unterstützung auf Augenhöhe
Our experts in action
How we work
In our short video, information security expert Jacqueline Striewe tells us how we can solve your challenges. Summarized briefly for you.

Meet our experts
The Team
From data protection and information security to more technical IT security - with us, you will find experienced security consultants who will competently master your individual challenges. And they are certainly aware of their responsibility towards your company. Get in touch with us!
Contact us
How can we protect you? Our security experts are happy to help. Get in touch with us.
Error: Contact form not found.
Thank you!
Your request has been submitted!
Thank you for your inquiry. We are looking forward to hearing from you. Our security experts will get back to you in 1-2 working days.