We protect your
IT-infrastructure

blueteamservice-stoerer-neu@2x
  1. 1-link
  2. 1-hover

Prevention

  1. 2-link
  2. 2-hover

Detection

  1. 3-link
  2. 3-hover

Response

Our modular system

Response

  • Reactions with Emergency measures
  • Direct cooperation with your IT

Detection

  • Use of the latest recognition methods
  • Advanced AI use in HIDS/NIDS and sensors
  • Security Operation Center (SOC) for analysis and comprehensive situation awareness

Prevention

  • Active vulnerability analysis through security assessments
  • Penetration testing and Red Team / Blue Team activities
  • Use of automated methods and human expertise

Prevention

We secure your IT-infrastructure

We take care that attacks on the property of your organization are prevented as far as possible. To accomplish this, we identify your tangible assets, such as locations, hardware and software, as well as processes and employees, and develop an understanding of your organization’s cyber security risk.

Linie@2x

What do you get from this service?

  • A higher level of protections through a concise understanding of your cyber security risks
  • A reduced likelihood of damage in regards to compromised data
  • A better level of data privacy (GDPR)
  • Higher level of confidentiality, availability and integrity of data
  • Resilient technology and IT-infrastructure
  • Complete services of a “Blue Team”, which defends your IT-infrastructure
  • Complete services of a “Red Team”, which simulates attacks on your IT-infrastructure
  • More awareness of social engineering and phishing among employees
  • Improved security of your sites with camera surveillance and access solutions

This includes methods, such as regular:

  • Regular risk assessments based on business impact analysis and threat/vulnerability analyses
  • Penetration testing and services of a “Red Team”, which simulates attacks
  • Implementation of vulnerability management processes and solutions
  • Hardening of your IT-infrastructure
  • Consulting in regards to the implementation of prevention controls (e.g. based on ISO 27001)
  • Awareness training of employees
  • Live monitoring and analysis of camera recordings

More details about our penetration testing services

Detection

We detect threats and anomalies

We offer a complete European Security Operation Center (SOC) as a service. The SOC service is provided by our selected cyber security specialists who work with the latest threat detection technologies. If required, this can also be provided around the clock.

Linie@2x

What do you get from this service?

  • Protection of your IT and locations by cyber security experts who work with state-of-the-art technology
  • Real-time alarming and close communication with your team as soon as attacks are detected
  • Reduced damage potential through immediate mitigation of damages
  • Cutting-Edge detection technologies as a service
  • Up-to-date information about the threats to your business
  • Contact point for your employees in security matters

These services includes:

  • 24/7 monitoring of your IT-landscape
  • Real-Time alerting and incident response and communication with your team
  • SOC Level 1-3 and close collaboration with your team
  • Security Information & Event Management (SIEM)
  • Collection, analysis and correlation of protocols and system information
  • Advanced Cyber Threat Detection & Threat intelligence incl. End-Point-Protection
  • Data Loss Prevention (DLP)
  • Intrusion-Detection-/Prevention-Systeme (IDS/IPS/HIDS/NIDS)

More details about our
Managed SOC Services

Response

We counter fight IT-attacks on you

Our strong cyber defense team eliminates any IT-attack and defends your IT-infrastructure against sophisticated exploits

Linie@2x

What do you get from this service?

  • Reduced damage by cybersecurity incidents
  • If required ‘around the clock’ services by our “blueteam” to constandly defend your IT-infrastructure
  • Freedom to take care of incident response tasks by yourself
  • Clear alarm chains and emergency plans
  • Optimized business processes and security status through quick reactions and improved recovery plans

This includes methods, such as regular:

  • Immediate removal of malware, gaps etc. by our Computer Security Incident Response Team (CSIRT)
  • Risk reduction through eradication of threats
  • Recovery of systems / assets after incidents
  • Development and improvement of recovery plans
  • Root-cause-analyses of threats and attacks
  • Digital forensic for possible further investigations
  • Reporting and communication with you and other stakeholders (“war room”)
  • Providing lessons learnt to increase security continuously

Blueteam

We secure your IT

Linie@2x
  1. kreis@2x
  2. kreis@2x
Prevention
  1. kreis@2x
  2. kreis@2x
Detection
  1. kreis@2x
  2. kreis@2x
Response
Linie@2x

Our help desk- and CSIRT-process

Our incident response process follows the OODA loop (Observe, Orient, Decide, Act):

  • Observe: If incidents occur, threats are identified and information are gathered.
  • Orient: The triage process starts. We determine the scope of the incidents, define a possible new classification and a priority / risk ranking.
  • Decide: In the Decision phase we determine the tactics for the minimization of the damage of your assets. Rules are used and updated, decisions regarding the remediation and recovery tactics are made.
  • Act: In the Act phase we do the remediation and recovery including the collection of all necessary evidences for a possible deeper forensic investigation. The act phase concludes with a lessons learnt and updates of use cases and playbooks to prevent similar events in the future.

Get in Contact

Linie@2xdark

Phone
+49 (0)30 555 724 96 0


Fields marked with * are mandatory.