Implementing security

Technical implementation of individual security concepts with suitable products from leading IT security manufacturers as completed projects. The focus is on the following manufacturers: Check Point, Cisco, RSA, McAfee and SEPPmail

Implementing business-oriented IT security

IT security isn’t an end in itself – in the age of digitalisation and Industry 4.0, it helps to secure and guarantee digital production and business processes. As challenges increase due to critical infrastructure protection, IT security legislation, compliance and the GDPR, the requirements for up-to-date, economical and state-of-the-art IT security implementations are growing at the same time.

As an IT systems provider with a full focus on IT security, we’ve got the necessary expertise and more than 20 years of practical experience in implementing IT security projects.


Certified quality

o ensure standardized quality and suitable security mechanisms, our IT security services are certified according to: DIN ISO/IEC 27001:2015 and DIN EN ISO 9001:2015

Market-leading manufacturers

Solutions from outstanding and innovative IT security manufacturers who are leaders in the tech field

Certified, experienced experts

Specialized, experienced experts who are certified by manufacturers – example: +100 Check Point certifications

Typical phases of our IT security projects:

Consulting – planning:

  • Examining organisational and network structures, identifying individual security needs
  • Developing the individual security concept with suitable products
  • Detailed planning, including clarifying all the technical and organisational framework conditions


  • Installing and basic configuration of selected hardware and software products in the ESC lab
  • Creating and configuring security policies according to selected manufacturers’ best-practice recommendations
  • Functional testing and inspecting the environment using individual diagnostic tools in the ESC lab
  • Installing and commissioning on the client’s premises with run-through and acceptance of previously defined test scenarios


  • Preparing brief technical documentation containing all the essential information
  • Handing over a network plan illustrating all the networks connected from the security gateway’s standpoint


  • Managed security service according to individual requirements and service level agreements (SLAs)
  • Maintaining and optimizing the required safety level

We also provide

Pioneering products and solutions from the world’s leading vendors




*Mandatory field


Thank you for your interest!

You can download the product sheet by clicking the button below.


*Mandatory field


*Mandatory field