

IT Security Solutions
With products from vendors like BalaBit IT Security, we offer you manifold opportunities for an individual log and security management.
Examples of our security solutions
Assembly of (audit proof) secure management environments
- PKI for SSH
- Web-based Unix Cluster Management
Protection of complexer IT-Infrastructures by
- Firewall concepts
- Application Layer Gateways
- Protocol inspection
- Secure Tunnel
Security Management
- Consulting for the introduction of security concepts
- Employeee instructions
Distributed Config-Management
We have gathered a great deal of experience in deploying the BalaBit IT Security products over the last years, and we can provide you with tailor-made solutions.