cybersecurity_3_1900x750

DATA & INFORMATION PROTECTION

We manage the entire data lifecycle and guarantee that your data is available, protected from loss and can be restored in an emergency. This covers your data from creation and storage down to deletion.
media alt text

INFORMATION PROTECTION

Data confidentiality and data integrity are increasingly in focus. The prerequisites for this protection are intelligent encryption and anonymisation methods, and cross-platform digital rights management, now coming to be expected for mobile applications, too. Are you in a position to ensure that documents and e-mails, for example, are viewed only by authorised persons?

  • Information & Data Protection with Azure Information Protection (1-day workshop, including demo and use cases)
  • E-mail Security via Office 365 Technologies (Message Encryption, Advanced Threat Protection) – Consulting
  • Data Classification (Consulting)
  • Data Protector for SAP (consulting, design, implementation & licensing)

AZURE INFORMATION PROJECT USES CLASSIFICATION TO PROVIDE PROTECTION OF OVERALL E-MAIL COMMUNICATIONS.

PETER ROSENDAHL, DIRECTOR SOLUTIONS CYBERSECURITY, CLOUD ARCHITECTURE & NEW WORK, ALL FOR ONE GROUP SE

THREAT PROTECTION

Protect your company from advanced threats and quickly restore its systems after an attack. We provide comprehensive consulting services related to Microsoft Threat Protection and support your company security to protect your assets. This platform is a single source for prevention, detection, analysis and responses in advance of attacks aids your security experts in their work to identify, prioritise and remedy vulnerabilities.

  • Threat Protection Solutions & Technologies (Consulting)

M365 SECURITY

All companies are faced with the task of assuring sensitive information and data are protected from increasingly complex cyber-security threats. And for many companies security management remains a great challenge as intelligent and sustained attacks rise. We help you to keep up the defences of your environment now and in future, despite continuous developments in the threat landscape.

  • Microsoft 365 Security Initial Analysis (1-day workshop with live demos)
  • Microsoft 365 Security Assessment via Secure-Score (1-day workshop)

FIND OUT MORE FROM OUR EXPERTS

DEVICE & LICENCE MANAGEMENT

Are you in control of your M 365 licences? Do you know how to provide targeted licence functions to your users? Effective licence management saves you money as a result of lower administrative - less manual - effort and minimise risks during an audit. And this for end-user devices rather than merely in the IT infrastructure. Let us advise you and help you develop a plan on how you can maintain data security at your company with modern licensing, software distribution and updates and centralised data security.

  • Office 365 Licence Management (1-day workshop)
  • Windows Autopilot/Analytics Device Health (Consulting)
  • Mobile Endpoint Security (consulting, design, implementation & operations)

FIND OUT MORE FROM OUR EXPERTS

PUBLIC KEY INFRASTRUCTURE (PKI)

Assurance of the secure communication of information is the underlying principle of the public key infrastructure (PKI). A PKI generally consists of guidelines, standards, hardware and software used to create digital certificates. Each digital certificate contains a pair of keys - a public key and a private, confidential key - used to decrypt information, a message or data. We advise you on building a public-key infrastructure and help you create the basic concept for implementation.

  • PKI Initial Analysis (½-day workshop)
  • PKI Structuring Workshop & Basic Concept (1-day workshop)
  • PKI Health Check (1-day workshop)
  • PKI Consulting

FIND OUT MORE FROM OUR EXPERTS