Detailbild bei der Arbeit

Security & Deep Web Analysis

Data today must be confidential, yet readily available – IT security targets this fundamental conflict of objectives.

In addition to a pronounced proclivity towards logical thinking, Auticon consultants are remarkably drawn towards rules and regulations, making them unparalleled experts in this highly sensitive business segment.

postbank

Postbank Systems AG

Not only does the Auticon consultant deliver outstanding results within his project – with his brilliant ideas and target-oriented way of thinking he also produced a lasting rewarding effect for the entire team. He thus created tangible value for us, significantly beyond the scope of what was expected.

Thanks to his swift and effortless integration into the existing project team and his meticulous eye for detail, we were able to utilise his output right from the start. We hereby wish to formally appreciate his work.

Sven OelschlägerHead of Application Governance

What we offer:

Rules and regulations need clear and straightforward definitions so that adherence can be ensured and misuse prevented. This is where Auticon consultants come in, with a pronounced passion for order and integrity.

Identification of code abnormalities based on predefined rules

Manual and automated code assessments

Scanning systems and websites for vulnerabilities in terms of errors or manipulation

Are there any gaps in the system? Where does the security concept fall short? Auticon consultants have an unusually comprehensive talent for assessing IT security procedures and rendering these bulletproof.

Analysis and extension of security concepts and documentations

Assessment of compliance with security guidelines and external requirements (MaRisk, ISO 27001)

Rating of implemented automated assessments (e.g. SAP CodeProfiler)

Intrusion testing: Evaluation of Firewall and network security

Non-autistic people search for information – autistic people find it. Auticon consultants employ this astonishing strength for your research and data acquisition demands – with exceptional hit rates.