IT security processes and concepts

Sustainable IT security with IT security processes and concepts

Conducting security checks on a technical level, e.g. in the form of vulnerability analyses, penetration tests or configuration checks, is important for identifying and eliminating acute threats. However, if the aim is to establish IT security in the organisation sustainably, it is essential to deal with the processes of IT operations and development.



We support you with practical knowledge in creating "cyber-healthy" organisational structures. The breadth and depth of such a review depend on the needs of the organisation and the defined scope. The scope can cover the following aspects:

    • IT documentation and IT asset management
    • IT project management
    • IT security incident management
    • IT change management
    • Authorisation and role concepts
    • On-boarding, internal change and exit processes
    • Network security
    • System and application security
    • Software development and operation processes (DevOps)
    • Vulnerability management
    • Patch management
    • Backup & restore
    • Logging & monitoring
    • IT security-related training for employees
During the review, we are guided by your internal security requirements, recognised standards and best practice recommendations from renowned institutions.


Your added value

After reviewing the IT security processes, we provide you with a report that explains the identified opportunities for improvement, prioritises them according to criticality and recommends measures for their elimination. In doing so, we attach importance to recommending not only selective but also holistic measures to you.

Further information on the subject of audits.


Niklaus Manser
Head of
IT Security Consulting



Non-binding enquiry


Of course 100% confidential, free and non-binding!