Cyber Defence

The increase in national and international cyber attacks shows that companies and public authorities are faced with the challenge of risk-based threat management and timely implementation of appropriate protective measures.


The risk of falling prey to a cyber attack has now become a major problem in our globally networked world. Apart from attacks on the so-called office IT, where most data thefts are perpetrated, over the past few years hackers' sights have also been trained on industrial production.

The sharp increase in networking and digitization in areas such as smart home, smart grids, autonomous driving, industry 4.0 and digital management means that constantly more targets will be open to attack in the future and this problem will have to be addressed accordingly.

And yet 70% of companies in the German-speaking region still do not have an adequate IT security staff. This is why it sometimes takes months before strategic cyber attacks are even discovered in the corporate network. The longer an attack remains undiscovered, usually the greater the damage done. Since it is impossible to achieve a one hundred percent security level, it is essential to detect attacks early, evaluate them and counter them with the right defensive measures.

Our experts help companies and public authorities alike to arm themselves better against cyber attacks and protect themselves effectively against data theft and loss as well as against financial damage.

Our References (excerpt)

We provide our services in the cyber security sector to a vast number of public and private customers. For example, we support a German federal agency with the introduction, further development and operation of its information security management system (ISMS) according to ISO 27001 based on IT baseline security. In this context we also take on the role of central contact for everything to do with information security. We advise German federal state authorities on the continuous optimisation of their existing security architecture and in the design and setting up of a Security Operation Centre and a Computer Emergency Response Team. This encompasses the central collection, processing and evaluation of all the information from security sensors in an SIEM system.