Integrated consulting services for your cyber security landscape
Services

Being prepared for cyber attacks

Security concept with an integrated approach from data center to smartphone

  • Get a grip on cyber security
  • Decision-making basis for implementing cyber security measures
  • Protection from Internet-based threats
  • Cyber shield for our customers
Contact
info.security[at]t-systems.com
Information on the company

Cyber security thanks to security expertise packages

Cyber security made easy with integrated consulting services for your cyber security landscape: IT security today requires a security concept that spans the entire value chain – from data center to network to smartphone. But where do you start? How do you keep track of everything? Magenta Security acts like a cyber shield, helping to protect you from Internet-based threats. Magenta Security provides solutions from a single source, so it is easy for you to get started with our standardized consulting packages. These compact packages, offered at a fixed rate, provide you with a tailor-made basis for making decisions regarding the implementation of your cyber security measures.
Top Download
The consulting packages in detail
  • Are your existing IT security systems capable of recognizing the latest, targeted attack patterns?
  • In this workshop, we will jointly conduct a security inventory
  • You will be presented with the findings and be given a risk assessment and recommendations on helpful technology
  • You will get an overall picture of the security level of your company's systems, identify your risks, and know which level you can reach and how
  • Check the brochure for additional information and our fixed prices 
  • Inaccessible online services and websites are expensive in terms of lost sales and a damaged reputation
  • We will analyze potential DDoS threats to networks, applications and web services, and check the effectiveness of protective measures that are already in place
  • The workshop will show you how to protect yourself from all known DDoS scenarios – with DDoS Protection for Backbone, On-premises and Cloud Web
  • Check the brochure for additional information and our fixed prices 
  • Attackers set their sights on the hardware, systems and data of an organization
  • Attackers attempt to gain control of networks and sensitive applications, take advantage of internal services and exploit legacy systems
  • Penetration tests serve to identify such vulnerabilities
  • The test will show you if and where you are at risk and what measures you can use to improve your cyber security and quickly reduce your risk to a minimum
  • Check the brochure for additional information and our fixed prices 
  • All-IP migration including a complete switch to Voice over IP (VoIP) requires a high security level for voice data in LANs and WANs and on the Internet
  • Is your IT security concept ready for a VoIP migration?
  • In this workshop, we will review your security concept, the VoIP capability of your hardware and any planned cloud solutions
  • We will perform an individual security assessment of the network topology, hardware and VPN connections
  • Check the brochure for additional information and our fixed prices 
  • Today, an ISMS should be an integral part of every corporate strategy, uniformly implemented across global units
  • Does your security organization already meet international ISMS standards?
  • In a workshop, we will use interviews and existing documents to analyze the ISMS in place at your company
  • We will assess the current security level using the ISMS maturity model
  • Check the brochure for additional information and our fixed prices 
  • Cloud computing presents great opportunities for implementing new business requirements quickly and flexibly
  • But what does the move into the cloud mean when it comes to security? How do you benefit from security from the cloud?
  • In this workshop, we will jointly set individual goals and define the systems to be transformed
  • We will use IT security analyses to identify your requirements and perform a cloud maturity check of the existing IT for use with cloud services
  • Check the brochure for additional information and our fixed prices 
  • A lack of security awareness and responsibility among employees poses security risks
  • In this workshop, we will jointly define measures for improving security awareness
  • Individually tailored for up to 12 representative employees from the IT security field
  • Check the brochure for additional information and our fixed prices 
  • Business and personal mobile devices increasingly use critical company data and are therefore fast turning into targets for cyber attackers
  • What can you do about such attacks?
  • In this workshop, we will work together to develop a mobile security concept for your company
  • Check the brochure for additional information and our fixed prices 
  • Isolated company networks are a thing of the past – WLAN, 4G/5G and clouds are gaining ground
  • How can you ensure secure network gateways? When are public or private networks the solution of choice?
  • Take advantage of this perfect opportunity to work towards the long-term protection of your network and improve information security at your company
  • Following a network analysis, we will assess current and planned IT and recommend measures for improving network security
  • Check the brochure for additional information and our fixed prices 
  • Advanced persistent threats targeted at IT systems are becoming more and more frequent
  • Are you prepared to counter current and future attacks? Can you respond quickly?
  • In this workshop, we will develop a strategy and a roadmap for activities aimed at achieving effective cyber security
  • Check the brochure for additional information and our fixed prices 
  • More and more applications are Internet-based. Secure access is often not ensured fast enough
  • What about your own firewalls? How can you protect yourself from new threats at a reasonable cost?
  • In this workshop, we will jointly develop a picture of the Internet access best suited to your requirements by performing an individual analysis of your network and security environment
  • Check the brochure for additional information and our fixed prices 
  • Cyber attacks cannot be avoided; damage can. Detection, classification and fast resolution are key
  • Are you well prepared in terms of technology and organization? Is a Computer Emergency Response Team (CERT) in place?
  • This workshop will provide you with a good understanding of CERT and IRM and show you which processes and services you can use to counter cyber attacks
  • Check the brochure for additional information and our fixed prices 

Related Topics