Privacy and Security:

  • vulnerability assessments
  • creating safety and security concepts
  • security audits
  • backup solutions
  • technical building protection

IT security concepts and assessments for

  • Applications
  • Databases
  • Webserver

Spying private or corporate data, loss of privacy, competitive disadvantage, remote control of computers, abuse the computer for criminal purposes on behalf of the victim, destruction or alteration of data and programs, … To counter such threats, the infrastructure must be documented first, to perform a risk analysis. After that appropriate protective measures and protection plans are designed.