Cyber Security Check
Cyber Security Check
Protecting know-how and data
The efficient protection of production systems against current threats such as cyberattacks, internal manipulation or incorrect configurations is becoming increasingly important. These threats can result in system failures or even a complete shutdown of production.
Our expertise for your OT security
With a team of experienced cyber security experts, we support you both in getting started with OT security and in optimizing it. Thanks to our many years of working with customers who belong to the critical infrastructures, we know the BSI specifications and the IT Security Act inside out and can help you to assess the current status of your production plant in detail on site. With the IT Security Act 2.0 (ITSIG 2.0), operators of critical infrastructures and companies in the special public interest are obliged to use an attack detection system as of May 1, 2023. With the upcoming EU NIS2 Directive, it is foreseeable that the use of an attack detection system will also become mandatory for other infrastructure operators.
With our analysis, we help you to review your production facilities and systems with regard to future requirements. We present the results to you in a joint workshop and develop targeted measures to improve your OT security.
Our services
- Design, installation, migration, maintenance and optimization of databases
- High level of expertise in working with Microsoft SQL Server, Oracle Standard and Enterprise
- Oracle certified in-house employees
- All-round support from a single source
- Coordinated solutions from database, interfaces and applications
Cyber Security Check
- OT network structure (segmentation)
- IT/OT network interfaces (DMZ)
- Data protection (backup and recovery)
- Documentation (network and assets)
starting at 1.990 €
(excl. travel expenses)
Vulnerability scan
Our experts use professional tools to analyze your systems for potential vulnerabilities in order to show you the necessary countermeasures in detail.
Concept for remote maintenance
For the area of remote maintenance, we develop a concept tailored to your needs. This includes setting up secure remote maintenance access through encrypted data transfer, central administration and logging of maintenance activities.
Network evaluation
Our tool- and hardware-supported network analysis is precisely tailored to the requirements of the control, automation and information technology of production plants and enables the desired, detailed evaluation.