IT Security

IT Security Solutions

With products from vendors like BalaBit IT Security, we offer you manifold opportunities for an individual log and security management.

Examples of our security solutions

Assembly of (audit proof) secure management environments

  • PKI for SSH
  • Web-based Unix Cluster Management

Protection of complexer IT-Infrastructures by

  • Firewall concepts
  • Application Layer Gateways
  • Protocol inspection
  • Secure Tunnel

Security Management

  • Consulting for the introduction of security concepts
  • Employeee instructions

Distributed Config-Management

We have gathered a great deal of experience in deploying the BalaBit IT Security products over the last years, and we can provide you with tailor-made solutions.