[tm_pb_section admin_label="section"][tm_pb_row admin_label="row"][tm_pb_column type="4_4″][tm_pb_slider admin_label="Slider" show_arrows="off" show_pagination="off" fullheight="on" auto="off" auto_ignore_hover="off" parallax="on" parallax_method="on" remove_inner_shadow="off" background_position="default" background_size="default" hide_content_on_mobile="off" hide_cta_on_mobile="off" show_image_video_mobile="off" custom_button="off" button_letter_spacing="0″ button_use_icon="default" button_icon_placement="right" button_on_hover="on" button_letter_spacing_hover="0″ custom_css_slide_description=" padding-top: 4%;" disabled="off" disabled_on="on||"] [tm_pb_slide background_image="https://externer-datenschutzbeauftragter-dresden.de/wp-content/uploads/2020/01/it-sicherheit-lg.jpg" background_position="default" background_size="default" background_color="#ffffff" use_bg_overlay="off" use_text_overlay="off" use_heading_bg_image="off" alignment="center" allow_player_pause="off" text_border_radius="3″ header_font_select="default" header_font="||||" body_font_select="default" body_font="||||" custom_button="off" button_font_select="default" button_font="||||" button_use_icon="default" button_icon_placement="right" button_on_hover="on" custom_button_2="off" button_2_text_size_laptop="51″ button_2_text_size_tablet="51″ button_2_text_size_phone="51″ button_2_letter_spacing_laptop="50″ button_2_letter_spacing_tablet="50″ button_2_letter_spacing_phone="50″ button_2_font_select="default" button_2_font="||||" button_2_use_icon="default" button_2_icon_placement="right" button_2_on_hover="on" button_2_letter_spacing_hover_laptop="50″ button_2_letter_spacing_hover_tablet="50″ button_2_letter_spacing_hover_phone="50″ bg_overlay_color="#5b8dbf" text_overlay_color="#dd7c7c"]
Information Security Consulting
Let our security experts advise you on how to sustainably protect your business against risks.
[/tm_pb_slide] [/tm_pb_slider][tm_pb_slider admin_label="Slider" show_arrows="off" show_pagination="off" fullheight="on" auto="off" auto_ignore_hover="off" parallax="on" parallax_method="on" remove_inner_shadow="off" background_position="default" background_size="default" hide_content_on_mobile="off" hide_cta_on_mobile="off" show_image_video_mobile="off" custom_button="off" button_letter_spacing="0″ button_use_icon="default" button_icon_placement="right" button_on_hover="on" button_letter_spacing_hover="0″ custom_css_slide_description=" padding-top: 4%;" disabled="off" disabled_on="|on|on"] [tm_pb_slide background_image="https://externer-datenschutzbeauftragter-dresden.de/wp-content/uploads/2020/01/it-sicherheit-lg.jpg" background_position="default" background_size="default" background_color="#ffffff" use_bg_overlay="off" use_text_overlay="off" use_heading_bg_image="off" alignment="center" allow_player_pause="off" text_border_radius="3″ header_font_select="default" header_font="||||" body_font_select="default" body_font="||||" custom_button="off" button_font_select="default" button_font="||||" button_use_icon="default" button_icon_placement="right" button_on_hover="on" custom_button_2="off" button_2_text_size_laptop="51″ button_2_text_size_tablet="51″ button_2_text_size_phone="51″ button_2_letter_spacing_laptop="50″ button_2_letter_spacing_tablet="50″ button_2_letter_spacing_phone="50″ button_2_font_select="default" button_2_font="||||" button_2_use_icon="default" button_2_icon_placement="right" button_2_on_hover="on" button_2_letter_spacing_hover_laptop="50″ button_2_letter_spacing_hover_tablet="50″ button_2_letter_spacing_hover_phone="50″ bg_overlay_color="#5b8dbf" text_overlay_color="#dd7c7c"]
Information Security Consulting
[/tm_pb_slide] [/tm_pb_slider][/tm_pb_column][/tm_pb_row][tm_pb_row admin_label="Row"][tm_pb_column type="4_4″][tm_pb_accordion admin_label="Accordion" use_border_color="off" border_color="#ffff" border_style="solid"] [tm_pb_accordion_item title="Information Security"]
We advise you on the alignment of your IT systems with the protection goals Confidentiality, Availability and Integrity as well as Authenticity. Our advice serves the protection against Dangers respectively Threats and the avoidance of economic Damage and the minimization of Risks.
Our implementation is oriented to the IT-Grundschutz and to recommendations of the German Federal Office for Information Security.
[/tm_pb_accordion_item][tm_pb_accordion_item title="Information Security Officer"]
As in data protection, we provide you with a Information Security Officer available that you anchor in your organization.
The responsibilities and authorities for the information security process are assigned by top management to these information security officers in a clear and consistent manner. In this position, we take care of your information security management system and guide your IT department through the practical implementation of the BSI IT-Grundschutz as well as related best practices such as ITL.
[/tm_pb_accordion_item][tm_pb_accordion_item title="Information Security Management System"]
We explain what an Information Security Management System (ISMS) is and we work with you to establish procedures and rules within an organization to permanently define, manage, control, maintain and continuously improve information security.
[/tm_pb_accordion_item][tm_pb_accordion_item title="Data Security"]
Our advice on data security has the technical Aim to secure data of any kind to a sufficient degree against loss, manipulation, and other threats. Sufficient data security is a prerequisite for effective data protection.
Furthermore, we develop data backup concepts and check their resilience after implementation.
[/tm_pb_accordion_item][tm_pb_accordion_item title="Information Technology Infrastructure Library (ITIL) "]
The Information Technology Infrastructure Library (ITIL) is a collection of predefined Processes, Functions and Rollersas they are typically found in every IT infrastructure of medium and large companies.
We guide your IT individually and practically through these best practice suggestions and at the same time bring the necessary tools and workflows from the field.
[/tm_pb_accordion_item] [/tm_pb_accordion][/tm_pb_column][/tm_pb_row][/tm_pb_section]