In this section you will find solutions for cyber and Internet security. The software usually includes protection against DoS attacks, eavesdropping, spoofing, tampering and much more.
Cyber Security, Internet Security
Current software solutions for data protection management, password management, IT baseline protection, data analysis, and electronic guides are listed here.
In this section we present a current market overview of information / IT security management systems that include e.g. assessment tools or monitoring of hardware interfaces.
ISMS - Information Security Management
The software listed here is used for monitoring and performance monitoring of networks and computers as part of the service and for proof of service level agreements.
In this current market overview, you will find software solutions on the subject of access control and authorization concepts, e.g. for security checks and continuous monitoring.
Access control, authorization concepts