...

Overview

We close gaps - for your security

We offer proactive and reactive services tailored for your needs. Our goal is a comprehensive protection and implementation concept that includes all topics of integral security

Infrastructure
  • Construction projecting and planning
  • Property Protection
  • Eavesdropping Protection
People & Organization
  • Recruitment
  • Mobility Safety & Security
  • Economic Crime Investigation
  • Emergency & Crisis Management
  • Know-how Protection
Information
  • Cyber Security
  • Informationsecurity & Privacy
  • Forensics

Selection of service packages

Comprehensive Company Protection Concept

Your benefit

Substantial improvement in risk awareness and the application of protective measures in the area of physical, personnel and IT security, as well as a significant increase in the all-over security maturity of the entire company. A comprehensive company protection concept and the necessary particular concepts are created. High level of protection of the company’s key knowledge, confidential information and innovation potential.

Go to the service

Training Integral Security / Information Security

Your benefit

Significant improvement in risk awareness and the application of defensive measures in the areas of information security and IT-security, but also physical and personal security. Significant reduction of vulnerability to attacks and a substantial increase in all-over security maturity throughout the entire company.

Go to the service

Background Check

Your benefit

You get to know the background of the person to be employed; You gain information about the past and possible risks of a future business relationship; Which risks you should avoid in the area of reputation / finances; What information can be verified and to what extent the result is influential for your further action; You receive recommendations for the further procedure regarding recruitment / cooperation in a business relationship.

Go to the service

Preliminary analysis of circumstantial evidence of eavesdropping

Your benefit

The preliminary analysis for eavesdropping defense / TSCM (Technical Surveillance Counter Measures) is the first step to secure the confidentiality and privacy of your premises. It enables to identify potential eavesdropping or security risks and, if necessary, to initiate comprehensive eavesdropping / sweeping measures. It helps to assess potential risks associated with eavesdropping and spying techniques and installations by third parties.

Go to the service

Technical Surveillance Counter Measures / Sweeping

Your benefit

You find out whether your competition / third parties are monitoring you technically or electronically; what kind of information could have been leaked; whether there is a selective or continuous information leak; whether your vehicle is being monitored (tracking device) or conversations tapped; what countermeasures are necessary and suitable.

Go to the service

Infrastructure

  • Construction projecting and planning
    • Security related site analysis
    • Building protection project planning
    • Coordination of all security installations
    • Access control and electronic means
    • Protection of IT infrastructure
  • Property Protection
    • Performance of risk analyses
    • Creation of basic protection and security concepts
    • Awareness raising and enforcement of security policies
    • Personal, infrastructure and property protection
  • Eavesdropping Protection
    • Sweeping (physical and electronic search for hidden audio and video devices)
    • IMSI Catcher Defense
    • Drone Defense
    • Defense/Protection Concepts

People & Organization

  • Recruitment
    • Background checks
    • Extraction of credit reports
    • Carrying out searches on site
    • Interviews with participants
    • HR training in background checks
    • Development and implementation of assessment centers with a focus on risk professions
  • Mobility Safety & Security
    • Analysis of security risks on business trips and in countries with inadequate security structures
    • Training on travel safety and behavior in sensitive situations
    • Creation of individually tailored travel risk policies
    • Offering and implementation of travel risk platforms
    • Support in planning business trips to high-risk regions
    • Cultural Awareness and Diversity Consulting for crisis areas
  • Economic Crime Investigation
    • Investigation of white-collar crime, industrial espionage, other offenses such as money laundering, corruption, fraud, etc.
    • Analysis/evaluation of connections and hidden information
    • Use of forensic and forensic engineering methods
    • Preservation of evidence and reporting for use in court
    • Searching for and locating assets
    • Detection of industrial espionage and white-collar crime, due diligence
  • Emergency & Crisis Management
    • Analysis of management structures with regard to security competence and crisis resilience
    • Analysis of security risks and crisis management capacities
    • Creation of emergency and crisis concepts
    • Security and crisis management training and exercises
    • Crisis and incident management support
    • Emergency support and management of trauma stress
  • Know-how Protection
    • Detection and defense against social engineering
    • Detection of and defense against white-collar crime and industrial espionage
    • Creating risk assessments and developing protection strategies
    • Awareness-raising measures, practical training, exercises and role plays
    • Information security and know-how protection for decision makers
    • Forensic Readiness

Information

  • Cyber Security
    • Cloud, Endpoint, and IoT/Blockchain Security
    • ISO 27001 certification
    • IT emergency concept, risk and crisis management
    • IT audits and vulnerability assessments
    • IT penetration tests (internal, external, web applications, WLAN)
    • Creation of IT security strategy and concepts
  • Informationsecurity & Privacy
    • Data protection analysis and adaptation (GDPR)
    • Legal advice and training on information and data protection
    • Workshops on contract law, data protection (GDPR), manufacturing and trade secrets
    • Vulnerability scanning and ethical hacking
    • Social media protection strategies
    • IT security officer and data protection officer in mandate
  • Forensics
    • Securing and documentation of material evidence (e.g. fingerprints)
    • Forensic investigations (e.g. document laboratory)
    • Preservation and analysis of DNA traces
    • Investigation of white-collar crime, industrial espionage, other offenses
    • Forensic data backups and evaluations of computers, laptops, servers, RAID systems, NAS, USB sticks, SD cards and other storage media
    • Smartphone and tablet PC as well as cloud and network forensics
    • IT forensics on IoT devices and vehicles