becon prepares you for audits in accordance with ISO 27001 and IT baseline protection guidelines, analyzes your IT, identifies vulnerabilities, develops security blueprints on the basis of any security deficiencies discovered, and implements them.
Preparation for ISO 27001 and BSI (German Federal Office for Information Security) IT baseline protection audits by certified experts.
Creation of security concepts for IT baseline protection in accordance with ISO 27001.
Implementation of an ISMS with i-doit for the documentation of procedures.
Over 2 decades' experience with data protection and compliance.
Competent handling of your valuable and highly-sensitive data, carefully supervised by our own full-time security staff.
Implementation of secure solutions in the areas of communication, cloud, system safeguarding and encryption.
Analysis & Evaluation
becon analyzes your IT in accordance with BSI baseline protection guidelines, identifies vulnerabilities and develops security blueprints on the basis of any security deficiencies which are discovered.
Conceptual Design & Planning
Creation of a security concept including the definition of the requirements on an ISMS. Upon request, the subsequent planning of a solution for valuable and highly-sensitive areas to guarantee a seamless implementation can be included.
Audit preparation & Documentation
Preparation for audits with informative workshops, conducted by certified experts. Provision of best practices for the documentation of ISO 27001 and IT baseline practices in i-doit.
Implementation & Optimization
Introduction of an ISMS on the basis of i-doit, combining a CMDB and IT protection. Rectification of vulnerabilities through optimizations to infrastructure in the areas of communication, cloud, system safeguarding and encryption.
Support & Consultation
Support for audits using a central CMDB which includes extensions for ISO 27001 and IT baseline protection. Service and guidance for the ISMS including all operational infrastructure measures.
i-doit Professional – An open-source ISMS with the advantages of a commercial CMDB