Information Security: Audit preparation according to ISO 27001 and IT-Grundschutz BSI
Audit and inspection support, initial certification support, surveillance audit and re-certification.
Vulnerability identification and development of security blueprints.
Establishment of resource-saving security concepts for every threat situation.
Security
becon prepares you for audits according to ISO/IEC 27001 and IT-Grundschutz according to BSI, analyzes your IT, identifies vulnerabilities, develops security blueprints based on the identified security needs and implements them.
Our services around Information Security
Analysis and evaluation
becon analyses your IT according to BSI IT-Grundschutz, identifies vulnerabilities and develops security blueprints based on the identified security needs.
Conception and planning
Creation of a security concept according to ISO 27001 on the basis of IT-Grundschutz according to BSI incl. Definition of the requirement for an ISMS. On request incl. subsequent planning of your solution for sensitive and vulnerable areas for a smooth implementation.
Audit preparation and documentation
Preparation and support of ISO/IEC 27001 and BSI IT-Grundschutz audits with certified experts. Provision of best practice for the documentation of ISO/IEC 27001 and IT-Grundschutz procedures in i-doit.
Introduction, optimization and implementation
Introduction of a ISMS on the basis of i-doit and combination of CMDB and information security. Addressing vulnerabilities through infrastructure optimizations in the areas of communications, cloud, system hardening, and encryption. Implement secure solutions in the communications, cloud, system hardening, and encryption segments.
Workshop
Workshop for implementing and optimizing a SIEM/SOC in response to the growing threat potential from cyber incidents.
Support from experts
Adept at handling sensitive and protectable data and auditing through own full-time security officer.
In this free webinar, we will show you how to build an efficient ISMS with i-doit. Protect your data!
becon BLOG
Articles on the topic of information security
Update ISMS 1.5.1 | New minor release available
As a little "New Year's Eve treat" a new minor release of...
becon BLOG
Articles on the topic of information security
Update ISMS 1.5.1 | New minor release available
As a little "New Year's Eve treat" a new minor release of...
Contact
Instant contact
Do you have any questions, suggestions, requests or are you facing a particular challenge? We look forward to hearing from you!