-
- Services & Consulting: service
- SEC-CHECK®
- Price:
- depending on project size
- Version:
- N/A
- Description:
- Services for auditing IT-Infrastructure with the objective to improve the technical security settings in the existing environment.
- Technology:
- Proprietary
- Categories:
- Security Assessment, IT Security Check, Network Security
-
- Services & Consulting: service
- Security Consulting
- Price:
- On request
- Version:
- N/A
- Description:
- Ergonomics, a leading Consulting Company in areas of Integrated Security, can support you in recognizing and resolving enterprise wide IT risks, dangers, and weak spots. Over the years, Ergonomics Security Consultants have gained immense knowhow – valuable in tackling the most challenging Organisational and Technical IT Security issues. On a daily basis, we deal with issues surrounding Secure IT Systems and Networks, Information Security Management, Data Protection, Crisis Management, Social Engineering, Security Concepts, and Security Audits. Our Consultants have a plethora of skills covering technical and business areas, and are therefore able to support you in defining your strategy and implementing it to a future state, or being your professional coach in close collaboration with you. International Credit Card organisations issue stringent security requirements to their contractual partners based on PCI Data Security Standard. Our Certified Security Auditors/Certified Security Assessors accompany you from analysis right up to implementation, and ensure that the highest security standards can be satisfied.
- Technology:
- Compliance (ISO 27001, PCI DSS), Schwachstellenanalysen, SCADA Security
- Categories:
- Security Consulting, General Security, IT Security Check, Encryption, Security Assessment
-
- Services & Consulting: service
- scanmeter
- Price:
- On request
- Version:
- N/A
- Description:
- Together, we are going to fight cyber risk Starting from basic tools up to groundbreaking features we have created the ultimate platform to support you to fight the increasing risks of the digital age. Automation: Dynamic (DAST) and static (SAST) application security testing methods Best-of-breed methodology: Ideal usage and intelligent combination of the best available security testing tools Cost reduction: Drastic cost reduction due to maximized automation Vulnerability management: Simplified management thanks to comprehensive inventory and historization Integration possibilities: Seamless integration into existing business and development processes (CI/CD) Secure software development: Secure Software Development Lifecycle (SSDL) and DevSecOps, everything under one roof Flexibility: Security assessments at your fingertips Reporting: Reports tailored to the addressees in the formats you are familiar with
- Technology:
- N/A
- Categories:
- Application Security, IT Security Check, Security Consulting, Network Security, General Security
-
- Services & Consulting: service
- Penetration Tests
- Price:
- On request
- Version:
- N/A
- Description:
- What is the best way to test the security of your IT infrastructure, systems and organization? Exactly, with a hacker attack! During a penetration test, our Cyber Seurity experts perform a real attack. This shows whether the infrastructure is sufficiently protected against attacks from outside and inside and whether it is in line with the accepted residual risks. Our approach is based on the recognized methods OWASP, OSSTMM and ISO 27001.
- Technology:
- N/A
- Categories:
- IT Security Check, Security Assessment, Security Consulting
-
- Services & Consulting: service
- Security Services
- Price:
- Siehe Webseite.
- Version:
- N/A
- Description:
- Safe Swiss Cloud’s security products mitigate risk from ransomware and protect servers, networks, workstations, email and active directory. They help to continuously improve IT security and strengthen defences against malware and ransomware. The security products and services portfolio includes: 1. Ransomware Recovery: Recover your IT environments from independent backups at Safe Swiss Cloud in case of an attack. 2. SIEM – Network Detection & Response: Analyse the big picture on your network devices and servers, to detect suspicious anomalies with our SIEM system. 3. Active Directory Auditing: Get warnings for unauthorised changes; alerts and audit reports for your active directory. 4. End Point Security: Protection from malware, ransomware and viruses for your servers, workstations and other devices. 5. Email Security: Protect your Email: prevent it from being a channel for malware and ransomware to enter your organisation. 6. Firewalls & Intrusion Prevention: Perimeter protection to prevent unauthorised access, intrusion detection & web application firewall. All products and services are available for on premise IT as well as for cloud computing IT infrastructure.
- Technology:
- Verschiedene
- Categories:
- General Security, Anti Virus, Network Security, Firewall, IT Security Check
-
- Services & Consulting: service
- Transformation (Legacy)
- Price:
- On request
- Version:
- N/A
- Description:
- You are using a software application that is important to you, which was "developed in-house" and is getting on in years. Maintenance is proving to be increasingly problematic, as the developer is no longer within your reach and internal know-how is lacking. Now you are looking for an experienced partner to help you transform the old application into a new one.
- Technology:
- N/A
- Categories:
- General Development Tools, General Office Automation, IT Security Check, Business Process Management, Desktop
-
- Services & Consulting: service
- Focused Private Bug Bounty Program
- Price:
- On request
- Version:
- N/A
- Description:
- 3-10 selected friendly hackers test your system First reports/bounties Fully managed program: We handle the triage, so you can focus on fixing vulnerabilities. (Triage = checking for duplicates and false positives, reviewing severity levels, reproducing bugs, etc)
- Technology:
- N/A
- Categories:
- IT Security Check, Security Consulting, Application Security
-
- Services & Consulting: service
- Wide Private Bug Bounty Program
- Price:
- On request
- Version:
- N/A
- Description:
- More comprehensive testing harnessing the power of the ethical hacking community Friendly Hackers apply to participate Fully managed program: We handle the triage, so you can focus on fixing vulnerabilities. (Triage = checking for duplicates and false positives, reviewing severity levels, reproducing bugs, etc)
- Technology:
- N/A
- Categories:
- IT Security Check, Security Consulting, Application Security
-
- Services & Consulting: service
- Consulting
- Price:
- On request
- Version:
- N/A
- Description:
- n der heutigen vernetzten Welt ist der Schutz Ihrer digitalen Infrastruktur von entscheidender Bedeutung. Unsere Experten unterstützen Sie dabei, die Integrität Ihrer Systeme zu gewährleisten und potenzielle Bedrohungen abzuwehren. Mit massgeschneiderten Lösungen und bewährten Strategien begleiten wir Sie auf dem Weg zu einer umfassenden IT-Sicherheit, die das Vertrauen Ihrer Kunden stärkt und Ihr Unternehmen nachhaltig voranbringt. Schliessen Sie sich uns an und machen Sie den ersten Schritt in eine sicherere digitale Zukunft.
- Technology:
- N/A
- Categories:
- Security Consulting, General Security, IT Security Check, Encryption, Network Security
This content is not available in English.