IT SECURITY.

flyout_teaser_standorte.jpg

flyout_teaser_pressemeldungen.jpg

flyout_teaser_weiterentwicklung.jpg

flyout_teaser_referenzen.jpg

flyout_teaser_events.jpg

flyout_teaser_portfolio.jpg

flyout_teaser_presscontact.jpg

flyout_teaser_events.jpg

flyout_teaser_organe.jpg

flyout_teaser_pressdownload.jpg

flyout_teaser_unternehmen.jpg

flyout_teaser_unternehmen.jpg

flyout_teaser_unternehmensentwicklung.jpg

flyout_teaser_international.jpg

flyout_teaser_public_sector.jpg

flyout_teaser_public_sector_branchen.jpg

flyout_teaser_events.jpg

flyout_teaser_jobs.jpg

flyout_teaser_pressemeldungen.jpg

flyout_teaser_presscontact.jpg

flyout_teaser_nachhaltigkeit_2.jpg

flyout_teaser_gruppe.jpg

flyout_teaser_zertifizierungen.jpg

flyout_teaser_karriere.jpg

flyout_teaser_press.jpg

English|GB

Protect your business assets.

Questions about IT-Security?

In 2016 more cyber attacks and cases of data theft were reported than ever before. Businesses are no longer counting cases of attacks in the thousands, but in millions! 1.8 million attacks were reported alone against the German federal government’s data network, and the German armed forces reported a whopping 71 million attacks (source: ZDF/Frontal-21). 

 

The German digital association, Bitkom, conducted a survey on espionage, sabotage and data theft and estimates total damages caused by hackers at 51 billion euros per year. What’s making matters worse: 51 per cent of German companies do not have a backup plan in place to limit damages inflicted by cyber crime.

james_l-kontaktbild_en.png

 

James Lothian

Pre-Sales Technical Specialist

 

Phone: +44 1249 467966
james.lothian@bechtle.com

Internal traffic has to be protected, too.

Many companies concentrate mostly on the perimeter firewall and so called north-south traffic when devising plans to protect themselves from cyber attacks. However, once a perpetrator gets into the network he can move freely about. To stop attacks from within, smart security solutions are needed that can do much more than filter out malware.

 

To ensure that your business’s vital data is protected Bechtle offers a range of comprehensive IT security solutions. We provide full protection, combining technical security with information security. That’s because an integrated security strategy is the best way to counter malware, data spying and data theft. Our certified experts will provide you with reliable, future-ready strategies—guaranteed.

 

We provide the following solutions for technical security and information security:

 

Technical security.

  • Data security: E-mail encryption, data loss prevention, PKI, authentication
  • Endpoint security: Antivirus and anti-malware solutions, personal firewalls and host IPS, hard drive encryption
  • Network security: 802.1X-based LAN and wireless security, IP address management strategies
  • Internet security: Firewalls, VPN, IPS, secure access

 

Information security.

  • Data protection: Consulting, audits, training, external data protection officer, assessor
  • Data security: Assessments, security strategies, certification preparation 
  • Legal compliance consulting: Liability, employment contracts, works council agreements, compliance, IT law

A secure solution: the IT security architecture.

Effective IT security requires a holistic approach. It’s the only way to guarantee that security loopholes are closed. Our IT security architecture consists of a five-step process.

schmuckbild_it-security_1440px_grafik_ie

1. Evaluation

In the first step, we evaluate the security situation and analyse the risks.

 

 

 

 

 

 

 

 

 

2. Organisation

We then review the legal and industry-specific requirements.

 

 

 

 

 

 

 

 

 

3. Technology

In the third step, we survey the network and deployed technologies. Are they still up to date? And what about end-point security? What are the possible loopholes? Only once we have sufficiently evaluated the basic infrastructure and the required security technologies do we turn our attention to the implementation of the IT security architecture.

 

 

4. Architecture

The security architecture is implemented in the fourth step. Additional technologies have to be integrated and the users sensitised to the importance of security, and if needed further training is given.

 

 

 

5. Operation

In the final step, the IT security architecture is analysed and monitored in operation. The implemented architecture is checked for any remaining vulnerabilities. How can cyber attacks be detected in time? What are the contingency plans? How fast can disaster recovery be performed? Additionally, we also offer maintenance and support to make sure there are no loose ends.