In order to optimize our website for you and to continuously improve it, we use cookies. By continuing to use the website, you consent to the use of cookies. For more information on cookies, please refer to our Privacy Policy.


Mobile work, access to documents and data at all times and from anywhere, use of many communication channels: how we work is changing and is increasingly interconnected and shaped by the cloud. Despite this, how can you ensure your data and information are secure?


Based on existing identity-lifecycle management processes, we develop an access management solution adapted for your company and implement it company-wide for all applications and services for both on-premise and multi-cloud environments. User and administrator roles are managed automatically or via self-service.


Take advantage of proven methods and processes to manage the lifecycle of the digital identities at your company. Our understanding of digital identities is not limited to you employees. We consider your partners, customers and IoT devices, too. We use our tried and tested procedure model to help you develop detailed HR management processes, providing information about how employees come into play, about existing processes and technical solution components already in place. Based on the evaluation of the model, we will recommend the most appropriate solution and support you in implementing the agreed goals. Our support includes both the organisational and the technological implementation.




Find out everything you need to know about the current condition to evaluate it, identify specific fields of action and determine appropriate measures to increase security.


Identity governance is the policy-based, centralised management of identity and access management processes. As a result, identity governance supports your company in both its IT security and compliance requirements. We assist you in creating a corresponding model and developing a solution adapted to your company requirements. Segregation of duties (SoD) and rectification processes are thus no longer an issue, allowing authorisation and access to be traced at any time.


Data confidentiality and data integrity are increasingly in focus. The prerequisites for this protection are intelligent encryption and anonymisation methods, and cross-platform digital rights management, now coming to be expected for mobile applications, too. For example, you must be capable of ensuring that documents and e-mails are viewed only by authorised persons. Our solutions cover the following areas:

  • Information & Data Protection with Azure Information Protection (1-day workshop, including demo and use cases)
  • E-mail Security via Office 365 Technologies (Message Encryption, Advanced Threat Protection) – Consulting
  • Data Classification (Consulting)
  • Data Protector for SAP (consulting, design, implementation & licensing)
  • Threat Protection Solutions & Technologies (Consulting)
  • Audit-Proof Archiving for Documents, Data and Information in Office 365 Subject to a Legal Obligation of Retention
  • Microsoft 365 Security


Are you in control of all cloud services at your company? Cloud governance allows you to maintain an overview of and control over these services. For data in the cloud to be secure, appropriate rules for transparency must define who may use which cloud resources and how.

This also applies to the architecture of your company. Clear roles and responsibilities permit quick decisions where accountability is on the line. An architecture governance model provides a structure for substantial cost savings, compliance with statutory regulations and business standards and effective risk management. We offer consulting services to find the architecture governance model that fits you.