Object Engineering has a tool framework which supports the refactoring of existing code and its relation to databases, user interfaces, interactions with other services a.m.m. The existing software is imported into a meta model and then analysed by the clients criteria. Hence the refactoring of the new code can be accomplished.
Technology:
N/A
Categories:
Software for Engineering, General Assessment, Security Assessment, Life Cycle Management, Process Management
ELCA’s consulting team includes more than 35 experienced consultants, who advise organizations in every sector on implementing their business strategies and reaching their objectives efficiently with the help of the most up-to-date technologies. We define future-proof, coherent IT strategies and business architectures and implement them sustainably in the organization. Our core competencies include strategic IT consulting, digital transformation, business and operational process analysis, business architecture, requirements engineering, change management, programm and project management as well as user experience, quality assurance and test management.
Technology:
Own and partner technologies: https://www.elca.ch/en/partners
Categories:
General Assessment, Security Assessment, General Consulting, General Business Analytics
Ergonomics, a leading Consulting Company in areas of Integrated Security, can support you in recognizing and resolving enterprise wide IT risks, dangers, and weak spots. Over the years, Ergonomics Security Consultants have gained immense knowhow – valuable in tackling the most challenging Organisational and Technical IT Security issues. On a daily basis, we deal with issues surrounding Secure IT Systems and Networks, Information Security Management, Data Protection, Crisis Management, Social Engineering, Security Concepts, and Security Audits. Our Consultants have a plethora of skills covering technical and business areas, and are therefore able to support you in defining your strategy and implementing it to a future state, or being your professional coach in close collaboration with you. International Credit Card organisations issue stringent security requirements to their contractual partners based on PCI Data Security Standard. Our Certified Security Auditors/Certified Security Assessors accompany you from analysis right up to implementation, and ensure that the highest security standards can be satisfied.
Technology:
Compliance (ISO 27001, PCI DSS), Schwachstellenanalysen, SCADA Security
Categories:
Security Consulting, General Security, IT Security Check, Encryption, Security Assessment
What is the best way to test the security of your IT infrastructure, systems and organization? Exactly, with a hacker attack! During a penetration test, our Cyber Seurity experts perform a real attack. This shows whether the infrastructure is sufficiently protected against attacks from outside and inside and whether it is in line with the accepted residual risks. Our approach is based on the recognized methods OWASP, OSSTMM and ISO 27001.
Technology:
N/A
Categories:
IT Security Check, Security Assessment, Security Consulting
Analysis, design and implementation of a secure network architecture. Central design aspects are usually: – Segmentation / zoning according to security levels – Strong focus on endpoint security – Use and build on the existing system landscape and tool chain – Build automation & self-service to ensure efficient network operations
Technology:
N/A
Categories:
Security Assessment, General Integration, General Security, Network Security, Firewall