Specialized in pragmatic
IT Security
Advisory on prioritizing and implementing
organisational as well as technical solutions
Our Cyber Security Framework
We help organizations mature their cyber security through all stages of their maturity journey.
To break down the complexity, our services are structured into the areas, which every organization, no matter size or sector, needs to assess to enhance their security posture and resilience.
* Our framework is inspired by the NIST Cyber Security Framework, developed by the National Institute of Standards and Technology.
Service Offerings
-
Detection Assessment
-
Cyber Due Diligence
-
Microsoft Entra ID Analysis
-
Microsoft 365 Security Analysis
-
Windows Client and Server System Analysis
-
Active Directory Password Analysis
-
Active Directory Security Analysis
-
Web Application Security Test
-
Internal Penetration Test (Assume Breach)
-
Web Service Security Test
-
Office 365 Hardening
-
Azure Cloud Resources Security Analysis
-
Microsoft Active Directory Tiering
-
Active Directory Security Hardening
-
Penetration Testing as a Service
-
External Penetration Test
-
Red Team Test
-
TIBER Red Team Test
-
How to Select Your New SOC Provider
-
Microsoft Sentinel SIEM Enablement
-
How to Build Excellent Detection
-
Reverse Engineering
-
Digital Forensics and Investigations
-
Crisis Management
-
Incident Response
-
Backup and Restore Assessment
-
Cyber Security Roadmap
-
Security Governance
-
CISO as a Service
-
Security Partner
-
Advisory to Security Leaders
-
Cyber Risk Management
-
Cyber and Geo Political Risk Report
-
Technical Phishing Test
Register for our recent white papers
MorningTech is a new webinar series that offers single-servings of hot cyber security topics to directors, CISO’s and IT professionals. Get valuable insights on technical and strategic issues during your morning commute.
Tech and Cyber Blogs
We continuously publish findings, perspectives and discussions on our two blogs.
Subscribe to our newsletter to keep updated on current and future development within IT security.