...

ONE STEP AHEAD
This is what you can expect of our Business Protection Competence Center

You affected by a damaging incident or a negative event. Or you require preventive consultation in the area of integral security. Simply give us a call. An expert from Swiss Business Protection AG will register your request, ask some questions and make an initial assessment. In the event of a crisis, our team of experts will provide you with prompt support and offer you solutions to ensure the incident is dealt with in optimal fashion and effectively defend against future attacks. We support you with the utmost discretion when it comes to incident management as well as prevention. From start to finish. From a single source. ONE STEP AHEAD

Infrastructure
  • Location Security
  • Property Protection
  • Eavesdropping Protection
People & Organization
  • Human Risk Factor
  • Recruitment
  • Mobility Safety & Security
  • Economic Crime Investigation
  • Emergency & Crisis Management
  • Know-how protection
Information
  • Cyber Security
  • Informationsecurity & Privacy
  • Forensics

Infrastructure

  • Location Security
    • Creation of basic protection and security concepts
    • Performance of risk analyses
    • Awareness-raising measures and training courses
    • Practical training programs, exercises and role-plays
    • Forensic readiness
    • Audits and enforcement of security policies
    • IT risk management
    • Audits and vulnerability analyses, GAP analyses, concepts
    • Support in the implementation of measures (project management)
    • Instruction/training of employees (medical, fire-fighting, general response to emergencies)
    • Analysis of security risks at (international) sites
    • Personal security in the event of internal company problems and dismissals
    • Fake social engineering attacks
  • Property Protection
    • Creation of basic protection and security concepts
    • Performance of risk analyses
    • Awareness-raising measures and training at all levels
    • Practical training programs, exercises and role-plays
    • Forensic readiness
    • Audits and enforcement of security policies
    • IT risk management
    • Audits and vulnerability analyses, GAP analyses, concepts
    • Support in the implementation of measures (project management)
    • Instruction/training of employees (medical, fire-fighting, general response to emergencies)
    • Analysis of security risks at (international) sites
    • Personal security in the event of internal company problems and dismissals
    • Fake social engineering attacks
  • Eavesdropping Protection
    • Sweeping (physical and electronic search for hidden audio and video devices)
    • IMSI catcher defense
    • IT forensics
    • Drone defense
    • Defense/protection concepts
    • Legal advice and training

People & Organization

  • Human Risk Factor
    • Social engineering defense
    • Training in the detection of industrial espionage activities
    • Forensic readiness
    • Awareness-raising measures
    • Creation of a basic protection concept
    • Legal advice and training
    • Training to identify white-collar criminals and white-collar crime risks
    • Security risk analysis
    • Emergency care and coping with trauma stress
    • Training programs and exercises in security and crisis management
    • Training on travel safety and behavior in sensitive situations
    • Protection of people, material assets and property
    • Training programs for decision-makers
  • Recruitment
    • Background checks
    • Extraction of credit reports
    • Carrying out searches on site
    • Interviews with participants
    • HR training in background checks
    • Legal advice and training
    • Creation of instructions and guidelines
    • Creation of recruitment concepts with a focus on risk professions/functions
    • Execution and evaluation of various test procedures and integrity tests
    • Development and implementation of assessment centers with a focus on risk professions
    • Implementation of coaching sessions for persons in high-risk professions
  • Mobility Safety & Security
    • Analysis of security risks on business trips and in countries with inadequate security structures
    • Emergency care and coping with trauma stress
    • Training programs and exercises in security and crisis management
    • Training on travel safety and behavior in sensitive situations
    • Personal security on business trips
    • Creation of individually tailored travel risk policies
    • Offering and implementation of travel risk platforms
    • Support in planning business trips to high-risk regions
    • Travel safety training programs
    • Endpoint security (Windows clients, iOS/Android)
  • Economic Crime Investigation
    • Investigation of white-collar crime, industrial espionage, other offenses such as money laundering, corruption, fraud, etc.
    • Detection/identification of suspicious facts, trends and phenomena
    • Analysis/evaluation of connections and hidden information
    • Information acquisition and monitoring
    • Verification of existing data with current information
    • Extraction of credit reports
    • On-site research
    • Interviews with participants, perpetrators and injured parties
    • Use of forensic methods
    • Preservation of evidence and reporting for use in court
    • Background checks
    • Due diligence
    • Searching for and locating assets
    • eDiscovery
    • IT forensics
    • Legal advice and training
  • Emergency & Crisis Management
    • Risk analysis
    • Awareness-raising measures and training courses
    • Practical training programs, exercises and role-plays
    • Forensic readiness
    • Independent check of framework agreements with external service providers
    • Awareness
    • Training programs for decision-makers
    • Analysis of management structures with regard to security competence and crisis resilience
    • Analysis of crisis management capacity
    • Basic protection and security concepts
    • Contingency/crisis plans
    • Emergency care and coping with trauma stress
    • Crisis and incident management support
    • Competence tests in security and crisis management
    • Training programs and exercises in security and crisis management
    • Culture diversity consulting in crises/crisis regions
    • Training and legal advice
    • Planning, execution and evaluation of command post exercises (incl. evacuation exercises)
    • Interim security and IT security officer
    • Interim data protection officer
  • Know-how protection
    • Create risk assessment
    • Develop security strategy
    • Defense Social Engineering
    • Training detection industrial espionage activities
    • forensic readiness
    • sensitisation measures
    • Create basic protection concept
    • Practical trainings, exercises and role plays
    • cloud security
    • endpoint security
    • IoT/Blockchain Security
    • ISO 27001 Certification
    • Audits and vulnerability analysis
    • Information security for decision-makers
    • IT risk agent
    • IT Emergency Preparedness and Crisis Management
    • Legal advice and training
    • Penetration test (internal, external, web applications, WLAN)
    • Fake Social Engineering Attacks
    • Creation of security concepts (strategy, concept, backup, firewall, etc.)
    • Training courses for decision makers
    • Create IT policies

Information

  • Cyber Security
    • Social engineering defense
    • Use of forensic methods
    • Data protection (GDPR)
    • Cloud security
    • Endpoint security
    • IoT/blockchain security
    • ISO 27001 certification
    • Audits and vulnerability analyses
    • Awareness
    • Information security for decision-makers
    • IT risk management
    • IT emergency preparedness and crisis management
    • Legal advice and training
    • Penetration tests (internal, external, web applications, Wi-Fi)
    • Fake social engineering attacks
    • Creation of security concepts (strategy, concept, backup, firewall, etc.)
    • Training courses for decision-makers
  • Informationsecurity & Privacy
    • Social engineering defense
    • Practical and real-life training programs, exercises and role-plays
    • Penetration tests
    • Ethical hacking
    • Vulnerability scanning
    • Legal advice and training
    • Workshops/awareness in the areas of contract law, data privacy (GDPR), manufacturing and trade secrets, white-collar crime, industrial espionage, cybercrime, other offenses
    • Data protection (GDPR)
    • Interim IT security officer and data protection officer
    • Information security for decision-makers
  • Forensics
    • Securing and documentation of material evidence (e.g. fingerprints)
    • Forensic investigations (e.g. document laboratory)
    • Preservation and analysis of DNA traces
    • Investigation of white-collar crime, industrial espionage, other offenses
    • Forensic data backups and evaluations of computers, laptops, servers, RAID systems, NAS, USB sticks, SD cards and other storage media
    • Smartphone and tablet PC forensics
    • Cloud and network forensics
    • Development of social media defense concepts
    • IT forensics on IoT devices and vehicles
    • Training and legal advice

EMERGENCY

+41 41 511 22 00

We’re here to help you in the event of a security incident – every day from 6 am to 12 midnight!

Kurzanalyse Integrale Sicherheit

Nehmen Sie sich 10 Minuten Zeit für diesen Check. Damit erhalten Sie gratis wertvolle Hinweise zur Verbesserung Ihrer Integralen Sicherheit.
zum Check