Security

Pre-audit, audit and inspection support, support for initial certification, surveillance audit and re-certification.

Z

Introduction of an IT security strategy and ISMS implementation to protect your IT resources.

Z

Audit preparation, as-is analysis and meeting IT security standards.

Z

Vulnerability analysis for proactive detection, remediation and protection against attacks.

Security

beconprepares you for audits according to ISO/IEC 27001 and IT-Grundschutz, analyzes your IT, identifies vulnerabilities, develops security blueprints based on the identified security needs and implements them.

Our services around security

Preparation of ISO/IEC 27001 and BSI IT-Grundschutz audits with certified experts.

Creation of security concepts according to ISO 27001 on the basis of IT-Grundschutz.

Introduction of an ISMS on the basis of i-doit.

Workshop for implementing and optimizing a SIEM/SOC in response to the growing threat potential from cyber incidents.

Adept at handling sensitive and protectable data and auditing through own full-time security officer.

Implement secure solutions in the communications, cloud, system hardening, and encryption segments.

About

Well kept with the

all-round worry-free security package from becon

Analysis & Evaluation
becon analyses your IT according to BSI IT-Grundschutz, identifies vulnerabilities and develops security blueprints based on the identified security needs.

Conception & Planning
Creation of a security concept incl. Definition of the requirement for a
ISMS
. On request incl. subsequent planning of your solution for sensitive and vulnerable areas for a smooth implementation.

Audit preparation & documentation
Support of the certification audit through appropriate workshops or internal audits conducted by a certified expert. Provision of best practice for the documentation of ISO/IEC 27001 and IT-Grundschutz procedures in i-doit.

Implementation & Optimization
Introduction of a ISMS on the basis of i-doit and combination of CMDB and information security. Addressing vulnerabilities through infrastructure optimizations in the areas of communications, cloud, system hardening, and encryption.

Accompaniment & Support
Support of audits with the help of the central CMDB incl. the extensions for ISO 27001 and basic protection. Support of the ISMS incl. of all operational infrastructure measures.

360° IT Documentation

i-doitProfessional – An ISMS with the advantages of a generic CMDB

BSI Confederation

IT-Grundschutz-Kompendium – Tool for information security

The IT-Grundschutz-Kompendium is the fundamental publication of IT-Grundschutz. Together with the BSI standards, it forms the basis for all those who wish to deal comprehensively with the subject of information security.

The IT-Grundschutz-Kompendium is published annually in February in a new edition. The BSI provides draft building blocks throughout the year for users to comment on.

A detailed list of the changes can be found on the
pages of the BSI.

BSI Confederation

IT-Grundschutz-Kompendium – Tool for information security

bsi federal office for information security it basic protection

The IT-Grundschutz-Kompendium is the fundamental publication of IT-Grundschutz. Together with the BSI standards, it forms the basis for all those who wish to deal comprehensively with the subject of information security.

The IT-Grundschutz-Kompendium is published annually in February in a new edition. The BSI provides draft building blocks throughout the year for users to comment on.

A detailed list of the changes can be found on the
pages of the BSI.

360° IT Documentation

More than an ISMS | Building a generic CMDB with i-doit

Security

In addition to the introduction of i-doit, we also support you with our experience during the audit preparation.

In this webinar we will show you how important an Information Security Management System is for your company.

Fact Sheet

IT Security in practice

In times of cloud, containerization, big data and digitalization, IT security remains a hot topic for many. Companies are increasingly exposed to new cyber risks. What can companies do proactively for their security? You can read about it in this free fact sheet.

fact sheet it security in practice becon gmbh

Fact Sheet

IT Security in practice

fact sheet it security in practice becon gmbh

In times of cloud, containerization, big data and digitalization, IT security remains a hot topic for many. Companies are increasingly exposed to new cyber risks. What can companies do proactively for their security? You can read about it in this free fact sheet.

Security

Links

Solutions

cyber security

SIEM

Information Security

Products

i-doit ISMS

i-doit add-ons

Contact

Instant contact

Do you have any questions, suggestions, requests or are you facing a particular challenge? We look forward to hearing from you!