In order to optimize our website for you and to continuously improve it, we use cookies. By continuing to use the website, you consent to the use of cookies. For more information on cookies, please refer to our Privacy Policy.
Cybersecurity_3_1900x750

DATA & INFORMATION PROTECTION

We manage the entire data lifecycle and guarantee that your data is available, protected from loss and can be restored in an emergency. This covers your data from creation and storage down to deletion.

INFORMATION PROTECTION

Data confidentiality and data integrity are increasingly in focus. The prerequisites for this protection are intelligent encryption and anonymisation methods, and cross-platform digital rights management, now coming to be expected for mobile applications, too. Are you in a position to ensure that documents and e-mails, for example, are viewed only by authorised persons?

  • Information & Data Protection with Azure Information Protection (1-day workshop, including demo and use cases)
  • E-mail Security via Office 365 Technologies (Message Encryption, Advanced Threat Protection) – Consulting
  • Data Classification (Consulting)
  • Data Protector for SAP (consulting, design, implementation & licensing)

FIND OUT MORE FROM OUR EXPERTS

AZURE INFORMATION PROJECT USES CLASSIFICATION TO PROVIDE PROTECTION OF OVERALL E-MAIL COMMUNICATIONS.

MARIO KRUKOW, SENIOR CYBERSECURITY ARCHITECT ALL FOR ONE GROUP

THREAT PROTECTION

Protect your company from advanced threats and quickly restore its systems after an attack. We provide comprehensive consulting services related to Microsoft Threat Protection and support your company security to protect your assets. This platform is a single source for prevention, detection, analysis and responses in advance of attacks aids your security experts in their work to identify, prioritise and remedy vulnerabilities.

  • Threat Protection Solutions & Technologies (Consulting)

M365 SECURITY

All companies are faced with the task of assuring sensitive information and data are protected from increasingly complex cyber-security threats. And for many companies security management remains a great challenge as intelligent and sustained attacks rise. We help you to keep up the defences of your environment now and in future, despite continuous developments in the threat landscape.

  • Microsoft 365 Security Initial Analysis (1-day workshop with live demos)
  • Microsoft 365 Security Assessment via Secure-Score (1-day workshop)

FIND OUT MORE FROM OUR EXPERTS

Cybersecurity_18_1900x750

WEB SESSION

E-MAIL SECURITY IN THE CLOUD

Is today's protection against spam and malware effective enough?

DATA GOVERNANCE

Data governance allows you to manage your company data at a holistic level across the entire lifecycle. The guidelines and procedures of a data governance solution ensure the data are protected and secure, and that they comply with legal requirements. In our workshop, we help you develop an audit-proof approach to archiving documents, data and information for which archival is either mandatory or worthy.

  • Audit-proof Archival with Office 365 (one-day workshop)

DEVICE & LICENCE MANAGEMENT

Are you in control of your M 365 licences? Do you know how to provide targeted licence functions to your users? Effective licence management saves you money as a result of lower administrative - less manual - effort and minimise risks during an audit. And this for end-user devices rather than merely in the IT infrastructure. Let us advise you and help you develop a plan on how you can maintain data security at your company with modern licensing, software distribution and updates and centralised data security.

  • Office 365 Licence Management (1-day workshop)
  • Windows Autopilot/Analytics Device Health (Consulting)
  • Mobile Endpoint Security (consulting, design, implementation & operations)

FIND OUT MORE FROM OUR EXPERTS

PUBLIC KEY INFRASTRUCTURE (PKI)

Assurance of the secure communication of information is the underlying principle of the public key infrastructure (PKI). A PKI generally consists of guidelines, standards, hardware and software used to create digital certificates. Each digital certificate contains a pair of keys - a public key and a private, confidential key - used to decrypt information, a message or data. We advise you on building a public-key infrastructure and help you create the basic concept for implementation.

  • PKI Initial Analysis (½-day workshop)
  • PKI Structuring Workshop & Basic Concept (1-day workshop)
  • PKI Health Check (1-day workshop)
  • PKI Consulting