Managed Security Services Packages

Information Security Threat

Small and medium-sized companies are increasingly becoming the focus of hackers. Causes of digital blackmail, industrial espionage, data leakage and manipulation are often weak points in IT Infrastructures and in employee awareness.

The human being is an important attack vector. The gateways are mostly phishing emails and social engineering. Establishing far-reaching technical and organizational solutions is complicated and expensive for small and medium-sized companies.

Furthermore, IT Systems are difficult to hack from the outside. Successful phishing is therefore the best way to break into a company network.

The internal protection of systems usually receives less attention. By hijacking accounts and thus access rights, an attacker can move across the entire company network. These attacks usually go undetected for a long time, as espionage is carried out at the same time.

This is exactly where we start – with the analysis of weak points and the implementation of specific security measures on the basis of standardized concepts and solutions through ISMS according to DIN IEC / ISO 27001, BSI IT-Grundschutz and VdS 10000.

Oliver Falkenthal

IT Security


Our solutions for standardized managed security services are the following packages:

Package S

Pentesting
  • Network Scan
  • Vulnerability Scan
  • Port Scan
  • Final Report
Phishing
  • Kick Off
  • Agreements
  • Final Presentation
  • Annual implementation of 3 waves

Package M

Pentesting
  • Network Scan
  • Vulnerability Scan
  • Port Scan
  • Check the permissions of the network shares
  • Check the Active Directory for incorrect configuration
  • PenTest from outside: Network Scan, Vulnerability Scan, Port Scan in DMZ
  • Final Report
Phishing
  • Kick Off
  • Agreements
  • Final Presentation
  • Implementation of 3 waves (2x per year)

Package L

Pentesting
  • Network Scan (2x per year)
  • Vulnerability Scan (2x per year)
  • Port Scan (2x per year)
  • Checking the authorizations of the network shares (2x per year)
  • Checking the Active Directory for incorrect configuration (2x per year)
  • Check network traffic for encryption
  • PenTest from outside: Network Scan, Vulnerability Scan, Port Scan in DMZ
  • Final Report (2x per year)
Phishing
  • Kick Off
  • Agreements
  • Final Presentation
  • Implementation of 3 waves (2x per year)
  • Individualized Phishing Email (every time it is carried out)

Package XL

Pentesting
  • Network Scan (2x per year)
  • Vulnerability Scan (2x per year)
  • Port Scan (2x per year)
  • Checking the authorizations of the network shares (2x per year)
  • Checking the Active Directory for incorrect configuration (2x per year)
  • Check network traffic for encryption
  • Host Scan (checking of local administrators and software used, including version)
  • PenTest from outside: Network Scan, Vulnerability Scan, Port Scan in DMZ
  • Final Report (2x per year)
Phishing
  • Kick Off
  • Agreements
  • Final presentation
  • 1 wave per month
  • Individualized phishing email (every time it is carried out)
  • Awareness training online (2x per year)
  • Grouped sending of the phishing mail

Our solution: Managed Security Services

 

Our standardized packages cover the most common gateways.

 

  • Phishing campaigns reduce human risk.
    • These campaigns and training courses raise employees’ awareness.
    • Through regular implementation, the topic of IT security remains in focus.
    • Awareness measures – Investigating your employees’ reactions to attempted fraud
    • This greatly reduces the risk posed by the human factor.

 

  • Penetration test – Analysis of your IT infrastructure with regard to acute security risks and security gaps, round off the protection.
    • Your infrastructure is tested and weaknesses uncovered.
    • Depending on the package, long-term preventive measures are also included.
    • Regular scans reduce the risk of recurring vulnerabilities.
    • Result: Internal vulnerabilities are uncovered, which makes it more difficult for an attacker to move around the company network.

Your profit over several years

 

Experience:
You benefit from our routine in the area of IT security.

Trust:
We are your partner for your IT security needs. Personal support takes place over the entire duration.

Comparability:
Regular campaigns and pen tests can show developments over the past few years.

Efficiency:
Fast results thanks to CCVOSSEL-exclusive tools and diagnostic programs.

Practicability:
You will receive implementable solutions that ensure safety in everyday work.

Know-how:
Employee training ensures the transfer of knowledge from us to you.

Productivity:
The security measures are also implemented during ongoing operations.

Quality:
Special needs can be recorded and recorded through reviews with our consultant. Planned changes to systems can thus already be recorded and taken into account.

Complete overview of the contents of the packages:

Sylwia-1

Sylwia Batashki

Team Assistant

Your contact person

We are always personally there for you.

We would be happy to provide you with further information on the security packages. For this you can simply get in touch with our contact person.

When placing the order, you will be provided with a permanent contact person from the department who you can reach directly. This ensures clarity and makes it easier for both sides to provide support during the project and subsequent support.

1 Step 1
Daten
Anrede
Name, Vorname
Position
Telefon Nr.
Unternehmen
Anschrift
Straße
Haus-Nr.
Ort
PLZ
Interesse an Paket
Wollen Sie ein Angebot für das oben genannte Paket?
Ihre Nachricht:
0 /
reCaptcha v3
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right