DE | EN

Security Assessment – Clarity about your IT security status

Cyber attacks are now among the greatest business risks for mid-sized companies. But where do you really stand in terms of IT security? This is where a security assessment creates transparency. We analyze your current security architecture, identify vulnerabilities and assess risks – always in line with regulatory requirements such as NIS2, ISO 27001 or industry-specific standards.

The result: a solid decision-making basis for your management, concrete recommendations for action for your IT team and a clear roadmap for how to protect your company against ransomware, data loss and business interruptions.

With our tiered assessment packages you have the choice – from a compact overview to an in-depth analysis. This way you receive exactly the level of support that fits your situation – fast, practical and prepared in a way that is easy to understand.

Go to assessment packages

Illustration Security Assessment

Why we are the right partner

  • We speak the language of your IT and the language of your management.
    Our project managers combine deep technical understanding with extensive experience in managing complex IT security projects. This is how we bridge the gap between specialist departments and the executive level.
  • We know the technologies and the vendors.
    As a highly specialized security partner, we have been working with premium vendors for years. That means: we know exactly which solutions integrate seamlessly into your infrastructure – and where the pitfalls lie.
  • We relieve your team immediately.
    Instead of tying up internal resources, we take over planning, steering and coordination. Your IT team can focus on day-to-day operations – we deliver results.

How we do it

  • Structured management – clear roadmaps, aligned priorities, measurable progress
  • Transparency – regular management reports so that you stay in control at all times
  • Efficiency – no endless discussions, but targeted implementation based on best practices
  • Result orientation – we don’t stop when a project plan is written but only when your security is measurably improved

Your direct benefit

  • Faster security gains – risks are quickly closed before attackers can exploit them
  • Plannable budgets – no hidden efforts, clear cost transparency
  • Reduced personal risk – you can always prove to management, supervisory boards or regulatory authorities that measures were implemented professionally
  • Carefree implementation – instead of project chaos you get a clearly guided process in which everyone knows what to do

Let’s talk before a list of to-dos turns into a security problem. Arrange your non-binding consultation now – and secure project leadership that truly takes responsibility.

Basic
€1,790
  • ✔︎ Vulnerability scan
  • ✔︎ Short report
  • ✘ Personal consultation
  • ✘ Recommendations for action
  • ✘ Management summary
  • ✘ Action plan
  • ✘ Follow-up meeting
  • ✘ Follow-up
Details
Standard
€4,890
  • ✔︎ Extended vulnerability scan
  • ✔︎ Risk report
  • ✔︎ Personal consultation (1h)
  • ✔︎ Recommendations for action
  • ✔︎ Management summary
  • ✘ Action plan
  • ✘ Follow-up meeting
  • ✘ Follow-up
Details
Premium
€9,990
  • ✔︎ Extended vulnerability scan
  • ✔︎ Detailed risk report
  • ✔︎ Prioritized action plan
  • ✔︎ Personal consultation (2h)
  • ✔︎ Management summary
  • ✔︎ Follow-up meeting (remote)
  • ✔︎ Follow-up after 30 days
Details

Basic Assessment

The first step towards securing your IT infrastructure

The Basic Assessment is the ideal starting point for companies dealing with IT security for the first time or needing a quick, high-level view of their current security posture.

The focus is on an automated vulnerability scan (max. 16 target IP addresses) that identifies common attack points in your infrastructure – without interfering with your operations. The result is a compact report that already highlights initial risks and gives hints on reducing them.

This package is particularly suitable for smaller companies, startups or organizations with limited security budgets that still want to take their first steps towards IT security – quickly, easily and at a clearly calculable price.

Services included in Basic:

  • Vulnerability scan: Automated detection of known vulnerabilities and certain configuration errors.
  • Short report: Compact evaluation with initial risk assessments.
  • No personal consultation or action planning included.

Price: from €1,790 plus VAT.

Request now Back to overview

Standard Assessment

In-depth analysis with concrete recommendations

With the Standard Assessment you get more than just a technical snapshot: you receive an in-depth analysis of your IT security posture combined with individual recommendations for action.

In addition to an extended vulnerability scan (max. 265 target IP addresses), we identify potential risks to your organization through interviews with decision-makers and managers, classify them in an understandable way and prioritize tailored recommendations.

Thanks to the included management summary, the assessment is also easy to understand for non-technical decision-makers. In a personal consultation we specifically address your questions and point out individual solution approaches. The Standard package is aimed at companies that actively want to improve their IT security without immediately conducting a full audit or penetration test.

Services included in Standard:

  • Extended vulnerability scan: Review of your systems for technical and configuration-based vulnerabilities.
  • Risk report: Comprehensible, prioritized presentation of the results.
  • 1h personal consultation: Discussion of the key points with an expert.
  • Recommendations for action: Concrete proposals for risk mitigation.
  • Management summary: Executive report for non-technical stakeholders.

Price: €4,890 plus VAT.

Request now Back to overview

Premium Assessment

Holistic security assessment & strategic guidance

Our Premium Assessment provides a comprehensive, strategically oriented security evaluation – focusing on the technologies used, the structure of the security organization and the associated processes. It goes beyond simply identifying technical vulnerabilities and gives you an almost complete picture of your security posture.

The analysis is based on an in-depth scan (max. 1,024 target IP addresses) of your systems, supplemented by an extended risk analysis. In addition to detailed recommendations for action and a prioritized action plan, you also receive a follow-up after 30 days to review the effectiveness of your initial steps. Our experts support you intensively – from the results presentation and personal consultation all the way to assisting with the implementation of concrete measures.

This package is ideal for companies with complex IT structures, high protection needs or regulatory requirements (e.g. NIS2, ISO 27001, KRITIS, GDPR). It combines technical depth with strategic perspective – for security that truly makes a difference.

Services included in Premium:

  • Extended vulnerability scan: Detailed review of external and internal systems for technical and configuration-based vulnerabilities.
  • Detailed risk report: Individually created, including evaluation, rationale and context.
  • 2h personal consultation: Results presentation as well as strategic and technical discussions at decision-maker and IT level.
  • Prioritized action plan: Evaluation by effort, impact and urgency.
  • Management summary: Report prepared in a decision-maker-friendly way.
  • Follow-up meeting (remote): Deepening open points and aligning strategy.
  • Follow-up after 30 days: Follow-up to track implementation progress.

Price: €9,990 plus VAT.

Request now Back to overview

Security Assessment – Clarity about your IT security status

Identify vulnerabilities, assess risks and create a clear decision-making basis for your management. With our tiered assessment packages you receive exactly the support that fits your situation – practical and easy to understand.

Request your individual security assessment now and gain transparency over your IT security.

Request Security Assessment