Information Security

according to ISO 27001:2013 | pre-audit, audit and inspection support, support for initial certification, surveillance audit and re-certification


beconprepares you for audits according to ISO/IEC 27001 and IT-Grundschutz, analyzes your IT, identifies vulnerabilities, develops security blueprints based on the identified security needs and implements them.

Why we are the right partner for you

Preparation of ISO/IEC 27001 and BSI IT-Grundschutz audits with certified experts.

Creation of security concepts according to ISO 27001 on the basis of IT-Grundschutz.

Introduction of an ISMS on the basis of i-doit.

Workshop for implementing and optimizing a SIEM/SOC in response to the growing threat potential from cyber incidents.

Adept at handling sensitive and protectable data and auditing through own full-time security officer.

Implement secure solutions in the communications, cloud, system hardening, and encryption segments.



Analysis & Evaluation
becon analyses your IT according to BSI IT-Grundschutz, identifies vulnerabilities and develops security blueprints based on the identified security needs.

Conception & Planning
Creation of a security concept incl. Definition of the requirement for an ISMS. On request incl. subsequent planning of your solution for sensitive and vulnerable areas for a smooth implementation.

Audit preparation & documentation
Support of the certification audit through appropriate workshops or internal audits conducted by a certified expert. Provision of best practice for the documentation of ISO/IEC 27001 and IT-Grundschutz procedures in i-doit.

Implementation & Optimization
Introduction of a
ISMS on the basis of i-doit
and combination of
and information security. Addressing vulnerabilities through infrastructure optimizations in the areas of communications, cloud, system hardening, and encryption.

Accompaniment & Support
Support of audits with the help of the central CMDB incl. the extensions for ISO 27001 and basic protection. Support of the ISMS incl. of all operational infrastructure measures.

In this free webinar, we will show you how to build an efficient ISMS with i-doit. Protect your data!

becon BLOG

Matching articles

becon BLOG

Matching articles


Instant contact

Do you have any questions, suggestions, requests or are you facing a particular challenge? We look forward to hearing from you!

+49 (0) 89 608668-0