In this globalised and digitalised world, companies must increasingly reckon with attacks from hackers and other cybercrime. adesso has developed the ideal service package to tackle this issue with its Cyber Risk Analysis. For a fixed price, it identifies and analyses any risks to cyber security.
Where does your company stand on cyber security? Are computer forensics and eliminating weak points on your agenda? Our specialists have just the expertise you need for addressing these matters. Your IT systems must be regularly checked and secured to keep threats to your company at bay. With our flexible solution approaches and many years of expertise in this sector, we can support and guide you in guaranteeing cyber security.
In the first workshop, we will define your current situation with you, agree upon targets and determine a framework for how to proceed. Here, we will also coordinate which IT system will be analysed for weak points.
Alongside the initial workshop and technical risk analysis, the Advanced Package features a Cyber Risk Analysis which reviews procedural and organisational issues.
As well as analysing cyber risks, as a competent partner in IT security & information security, adesso also offers support in many other areas. This means that our analysis not only uncovers existing risks, but we can also minimise risks to your company with our service packages by eliminating weak points and offering computer forensics, for example.
With the aid of a monthly persistence check, we facilitate a detailed security audit and continuous security monitoring. The persistence check serves to preserve your IT security, as well as identify deviations from compliance and suspicious system behaviour.
Continually changing cyber risks necessitate the consistent adjustment of security measures. Our penetration tests identify weak points and uncover potential errors which result from (faulty) operation.
Computer forensics concerns the investigation of suspicious incidents relating to IT systems. The offence and offender are detected by logging, analysing and evaluating digital traces. Even ‘conventional’ crimes and tax fraud can now be uncovered by investigating and evaluating computer systems. A significant element of computer forensics is ensuring that digital evidence is legally watertight, meaning that it must comply with legal requirements. We guarantee this by seamlessly and comprehensively documenting the evidence and all other analysis steps, right up to the result of the forensic data analysis.
adesso is on call with 24-hour crisis management in the event of an attack. This involves:
Establishing a business continuation management plan means that emergency situations can be better handled. Before this type of situation has even arisen, we will have identified the necessary measures and prepared accordingly. This includes emergency planning, tests, operation and restoration, as well as a return to normal operation after an emergency.
adesso and its consultants are certified according to ISO/IEC 27001. We will support you comprehensively in eliminating any weak points and risks we have identified — in procedural and organisational matters, as well as technical issues. This involves: