DE | English
CYBER CRIME AND DEFENCE.

Bechtle security: Cyber crime and defence.

Companies and the public sector are slowly beginning to realise that there is no 100% protection against cyber-attacks and the European Data Protection Regulation’s obligation to report security incidents within 72 hours is driving the message home.

 

Modern concepts.

New approaches which focus on attack detection and subsequent reactions are becoming more and more important. This includes the Cyber Defence Centre concept—a highly specialised team, available 24/7, responsible for detecting and reacting to attacks.

 

The technical cornerstone of a Cyber Defence Centre these days is a SIEM system (Security Information & Event Management). SIEM systems collect and correlate the log information of all kinds of IT systems and alert users to security-relevant events. The only requirement is that a use case is defined for these security-relevant events.

 

 

Bechtle services.

Bechtle supports its customers in setting up a Cyber Defence Centre with SIEM systems, but that’s not all. Using a combination of forensic tools and machine learning, it’s possible to do away with an SIEM system by employing use cases, enabling attack detection without any manual effort, and thus saving an immense amount of resources.

Questions about Security?

Simply e-mail us at info@bechtle.com or call us on +49 7132 981-1600. We're happy to help.

 

 

send e-mail

The services cover all phases of tasks that occur in connection with IT forensic/discovery/cyber defence platforms and are split into the following:

(RE)-DESIGN.

  • Determining goals, formulating requirements
  • Basic solution design

PLANNING.

  • Software tool set
  • Data sources, interfaces, automation
  • Mapping of requirements for the IT infrastructure Performance, capacity, scaling
  • Availability, security, dependent systems
  • Implementation preparation and definition of operational tasks

IMPLEMENTATION.

  • Installation of all hardware and software components according to manufacturer best practices
  • PoC, data migration and user training as required
  • Determining goals, formulating requirements
  • Basic solution design
  • Software tool set
  • Data sources, interfaces, automation
  • Mapping of requirements for the IT infrastructure Performance, capacity, scaling
  • Availability, security, dependent systems
  • Implementation preparation and definition of operational tasks
  • Installation of all hardware and software components according to manufacturer best practices
  • PoC, data migration and user training as required

OPERATION.

  • Proactive control and maintenance to ensure permanent availability as well as sufficient infrastructure performance reserves
  • Infrastructure management
  • Update and patch management

REVIEW.

  • Proactive control and maintenance to ensure permanent availability as well as sufficient infrastructure performance reserves
  • Infrastructure management
  • Update and patch management
  • Checking and (if required) adapting requirements

     

  • Checking and (if required) adapting requirements
     

Professional vulnerability management.

Cybercrime and defence also includes comprehensive vulnerability management, both from within the internal network and via external checks.


Today’s IT environments not only include standard systems, but also an increasing number of dynamic ones. Companies are increasingly relying on virtual systems or cloud-based solutions that can be employed quickly and according to needs. These solutions can be dynamically assigned to networks and IT infrastructures and also revoked again. Standard quarterly, monthly or even weekly scanning is therefore no longer enough to guarantee the necessary visibility of vulnerabilities.

 

Organisations need modern solutions that offer a variety of ways to identify vulnerabilities in dynamic assets. They also have to provide clear recommendations on how to prioritise and deal with vulnerabilities while simultaneously being adaptable to the organisation’s different needs.


For this reason, Bechtle offers its customers Black Box and White Box penetration tests, during which known and unknown areas in a company’s network are cyclically and dynamically checked for vulnerabilities and then evaluated.

 

Bechtle also offers a service of checking business critical information circulating on the internet and on the dark net, whereby both are specifically searched for company-specific and critical data and the customer is informed if anything is found.

 

As an additional component of the Cybercrime and Defence offer, Bechtle checks passwords and accounts using privileged user management solutions, with all application and system passwords checked and changed cyclically. These changes are documented and managed for audit using appropriate modules ensuring that relevant compliance requirements are taken into consideration.

What security measures are relevant for your company?

Application security.

Even harmless applications can turn into security problems. We’ll demonstrate how you can best protect your company against this.

Learn more

Cloud security.

From private and public to hybrid cloud—every infrastructure is different and therefore needs to be considered individually. We’ll show you what to watch out for.

Learn more

Data centre security.

Are you still using legacy hardware? Is your data centre already completely digital or are you using a hybrid cloud? We’ll highlight all security factors.

Learn more

Data backup and information security.

How should your company react when you detect theft? What consequences are there? We’ll answer the most important questions.

Learn more

Infrastructure and perimeter security.

Companies need IT infrastructures tailored to their companies. And we’ll be glad to show you what you need to take into account.

Learn more

Workplace security.

The working world is currently changing. Companies are embracing new technologies to increase their efficiency and productivity.

Learn more

References.

Heidelberg Cement.

HeidelbergCement is one of the world’s largest building materials companies. Over 63,000 employees at more than 3,000 locations in some 60 countries spanning five continents fuel its success.

a.i.m. all in metal GmbH.

This page is not currently available in the selected language.

Renz Group.

Renz' digital postbox makes it easy to send and receive parcels. Bechtle implemented the web portal, which is connected to the smart, electronically controlled parcel facility.