A secure network infrastructure protects against cyber attacks, secures data and meets legal requirements. Our blog shows how tools such as Wazuh and proven measures help to effectively protect networks and keep them stable.
becon BLOG
Information Security
The changing defense industry: challenges and opportunities in times of geopolitical tensions
The defense industry is facing a turning point. The digitalization, automation and networking of weapon systems present both opportunities and challenges. At the same time, the demands on IT security and the resilience of critical infrastructures are increasing.
Security Operations with Wazuh – Fast and effective incident response
An efficient response to security incidents is crucial. Companies must not only be able to detect threats in real time, but also respond immediately to minimize damage. In this third part of our blog series, we show how Wazuh helps companies to efficiently manage security incidents and optimize their security operations.
Why insurers require a SIEM solution when taking out cyber insurance
Insurers have tightened their requirements in recent years: one of the most common prerequisites for a policy approval is the implementation of a Security Information and Event Management (SIEM) solution.
becon GmbH is new consulting partner of KIX Service Software
becon GmbH is pleased to announce the official partnership with KIX. As a KIX Consulting Partner, we now offer companies comprehensive support for all aspects of KIX Service Software.
becon GmbH becomes Wazuh Gold Partner and expands its security portfolio
becon GmbH is pleased to announce the official partnership with Wazuh.
Strengthen IT security with Wazuh – Threat Intelligence
It is not enough to simply react to attacks. Companies need to act proactively to detect and defend against potential threats at an early stage. We take a look at how Wazuh helps to understand, analyze and successfully combat threats with its threat intelligence functions.
Update VIVA2 3.2.4 | New minor release available
In the new version 3.2.3 of the VIVA2 add-on, the main focus was placed on improving the export functionalities of the protection requirement inheritance. Furthermore, the visual appearance has been adapted to the new layout of i-doit and an incompatibility of the installation routine with current i-doit versions has been rectified.
Maximum security and efficiency: ISMS and compliance with i-doit
Compliance and information security standards are critical tasks for organizations of all sizes. We take a look at two key concepts that help companies overcome these challenges: A powerful information security management system (ISMS) and a clear compliance tool that helps meet IT policies and standards as straightforwardly and clearly as possible.
Update ISMS 1.5.5 | New minor release available
With the new version 1.5.5 of the i-doit add-on ISMS, in addition to fixing the compatibility problems, standard requirement texts can now also be formatted and risk owners can be documented in the risk assessment.
Update ISMS 1.5.4 | New minor release available
With the new version 1.5.4 of the ISMS add-on, the attributes introduced in the new ISO27002 can now also be used. Further improvements to PHP8 compatibility and adjustments to the interface to i-doit have also been implemented.
Update VIVA2 3.2.3 | New minor release available
In der neuen Version 3.2.3 des VIVA2-Add-ons wurde das Hauptaugenmerk auf die Verbesserung der Exportfunktionalitäten der Schutzbedarfsvererbung gelegt. Außerdem wurde das optische Erscheinungsbild an das neue Layout von i-doit angepasst und eine Inkompatibilität der Installationsroutine mit aktuellen i-doit-Versionen behoben.
Abonnieren Sie unseren Blog!
Erhalten Sie Informationen zu OpenCelium Updates, Releases, neuen Whitepapern, Tutorials und aktuellen Events.
Abonnieren Sie unseren Blog!
Erhalten Sie Informationen zu OpenCelium Updates, Releases, neuen Whitepapern, Tutorials und aktuellen Events.