Information Security

Our goal is to protect your corporate data and ensure its confidentiality, availability and integrity - for your company's safety. Let's get it on.

Get in touch

productportfolio

OUR Offer

Together with you, we ensure the confidentiality, availability and integrity of the data for which you are responsible. In this way, you not only defend your data stores, but also your good reputation. We are happy to support you with our expertise.

security.Holisticon_Informationssicherheit_1

Your sensitive data and systems need protection

Your company’s sensitive information can be found within processes, systems and on data carriers. That’s why you need an ISMS to consistently protect your systems and data. Implement security measures and a continuous improvement process in your company. We would be happy to support you in setting up and implementing an ISMS in accordance with ISO 27001 or BSI IT-Grundschutz.

An ISMS protects your company against:

  • Outside attacks
  • Damage to your reputation
  • Significant loss of data
  • Monetary losses
  • Liability risks and lawsuits
  • Corrupted integrity of data and information
Informationssicherheit_InternesAudit

Audit your security in moderation

Before an external audit by an accredited body, an internal audit must be performed for an ISMS. Our experienced consultants will be happy to support you in this. We ourselves operate an ISMS in accordance with ISO 27001. Thanks to our extensive experience, we know what auditors value and can adequately prepare for the external certification audit.

Our internal audit ensures:

  • Comprehensive gap detection
  • Extensive documentation
  • Elimination of existing gaps before external audit
  • Optimal preparation for external audit
Holisticon.security_Informationssicherheit_Notfallmanagement

Emergencies are not acts of god

What happens when your most important IT system goes down? How long can this system be offline before your company suffers significant damage? We can help you set up an emergency management system in accordance with BSI Standard 100-4.

Do you know how to prepare for an emergency?

  • Running through possible emergency scenarios
  • Documentation of individual emergency plans
  • Emergency exercises for employee awareness
  • Definition of responsible persons and actions for emergencies
  • Smooth emergency management
GapAnalyse

Identify gaps in your security

Feeling overwhelmed by the flurry of regulatory, legal and customer requirements for information security? An individual gap analysis helps you identify the current status of your company with regard to your security. We’d be happy to assist you in preparing it.

Close the gaps and create security:

  • Variance analysis
  • Concrete recommendations for actionables
  • Security awareness
  • Increase the security of your company
  • Protection against loss of data and reputation
security.Holisticon_security-team_jacky_lukas_martin_HERO

Don't take risks

In the IT sector, risk management is extremely important. If you don’t think about security right from the start or monitor it continuously, your security risk is immense. Our security experts will work with you to ensure an environment without unnecessary risks. With the introduction of our tailor-made risk management, your company will benefit in the long term from a stable, secure and compliant IT, e.g. according to ISO 27005 and 31000.

Risks are calculable:

  • Identification of information security risks
  • Evaluation of potential impacts
  • Definition of mitigation measures
  • Design of a security risk management
  • Integration into your existing risk management
Informationssicherheit_DataGovernance

Data governance - secure efficiency

Are you processing your data efficiently and getting everything out of it? Together with our Smart Data and AI team, we show you how to get the most out of your data, and we’ll help you do it securely and compliantly. -> Want to dive deeper into the world of data? Then take a look at our website. (LINK Smart Data subpage)

Use your data securely:

  • Efficient and secure data aggregation
  • Identification and adherence to compliance requirements
  • Compliance with DSGVO requirements
security.Holisticon_Informationssicherheit_AwarenessTraining

Corporate security is a team sport

The strongest firewall is your team; by implementing a strong security awareness in tandem with our security experts,
you ensure your company’s safety in the long term.

Team success is guaranteed:

  • Designing phishing campaigns
  • Unplanned security drills
  • Exciting security quizzes
  • Informative awareness trainings

Our experts in action

How we work

In our short video, information security expert Jacqueline Striewe tells us how we can solve your challenges. Summarized briefly for you.

Cover play icon

Meet our experts

The Team

From data protection and information security to more technical IT security - with us, you will find experienced security consultants who will competently master your individual challenges. And they are certainly aware of their responsibility towards your company. Get in touch with us!

Sicherheit Jacqueline Striewe

Jacqueline Striewe

Information Security

Is enthusiastic - even about supposedly dry topics such as data protection, ISO and DIN standards. She likes people and colorful personalities. In her free time she enjoys taking long walks by the sea with her furry friend.

Jacqueline's workshops

Sicherheit Christian Westerkamp

Christian Westerkamp

Data Protection

Unconventional lawyer, passionate and listening advisor with an eye for the essentials and practical solutions. Seekers of gray areas and keeper of data protection. Considers Information Security important.

Sicherheit Lukas Taake

Lukas Taake

IT-Security

Developer who likes FOSS. Tries to keep an eye on the essentials, always looking for new challenges.

Lukas's workshops

Martin Reinhardt

Martin Reinhardt

IT-Security

Martin has spent many years practicing Java and web development. As a software craftsman it's of great importance to him that distributed architectures, particularly security and automation of continuous delivery, have pragmatic solutions.

Contact us

How can we protect you? Our security experts are happy to help. Get in touch with us.

    Thank you!

    Your request has been submitted!

    Thank you for your inquiry. We are looking forward to hearing from you. Our security experts will get back to you in 1-2 working days.