IT security with Consist

Ever increasing data volumes, rapidly growing networking of information, and constantly new security threats make IT security a key issue. Safeguarding IT against threats and real attacks is essential.

Our security consultants and analysts draft safeguarding strategies geared to state-of-the-art technology and best practices, and implement them for specific customer requirements.

Security in the time of corona

We are here for you and support your company in these challenging times with special IT security services.

Do you require particular IT security resources? Such as for safeguarding increased home-office activity by your employees? Ask us which options are available and we’ll be happy to present them to you in a webinar.

Consulting plus IT Solutions

Certified Consist experts and solutions from a single source

Our consultants have many years of project experience in the fields of Finance, Industrie, Retail und Logistik. Consist’s clients appreciate the implementation of security specifications resulting from compliance requirements, such as BaFin, and the associated, very individual connections of proprietary systems and those which were hardly possible to monitor before. 

From the security analysis of your company to permanent compliance with security standards, you receive a modular, needs-oriented implementation of the individual services.

Consist IT-Security-Portfolio

Cyber Scoring # Risk Management # Password Management # Vulnerability Assessment # Security Information and Event Management (SIEM) # E-Mail Security & Protection # Endpoint Security Management # Endpoint Security Prevention # Insider Threat Management (ITM) # Consist Managed IT Security #

Governance

  • Risk management

    ISMS, BSI IT Grundschutz, NIST

    Risk management
  • Compliance

    ISO 27001, KRITIS, PCI, MaRisk, BAIT, VAIT

    Compliance
  • Data protection & privacy

    General Data Protection Regulation (EU) (GDPR), Europäische Datenschutz-Grundverordnung DSGVO

    Data protection

Assessment

Solutions

  • SIEM

    Security Information and
    Event Management

    SIEM
  • SOC

    Security Operations Center

    SOC
  • Managed Security

    Managed SIEM, SIEM as a Service, SOC as a Service

    Managed Security
  • Endpoint Security

    policy-based Endgeräte-Sicherheits-Management

    Endpoint Security
  • Insider Threat Management (ITM)

    User Behaviour Analytics (UBA), Data Loss Prevention (DLP)

    DLP
  • Security Awareness und Threat Intelligence

    Awareness training, training management

    Security awareness

Security partners

Prize-winning security expertise

Security consultants from Consist are a match for the best in the world. In 2017 and in 2023 they were winners of the international IT security competition "Boss of the SOC". In 2020 they were able to add the "Boss of the NOC" to this award, among more than 2,100 participants who took part in the special IT Operations Competition on a global level.

These experiences are employed in practice, as confirmed by the many successful projects in the field of security. Our clients appreciate the implementation of security specifications resulting from compliance requirements, such as BaFin and the associated, very individual connections of proprietary systems and those which were hardly possible to monitor before.

 
 

Our comprehensive approach

ganzheitlicher Ansatz

With Consist's holistic IT security concept, you can document your compliance with statutory security requirements while improving the performance of your IT for the long term.

From the security analysis of your company to permanent compliance with security standards, you receive a modular, needs-oriented implementation of the individual services.

Bild vom IT-Security-Experten Henry Grow

Requirements

IT security solutions should be legally sound and meaningful, easy to integrate as well as scalable to the relevant size of the company.

Expert opinions

“IT security is not a question of budget, IT security needs to be lived within the company. Even the best security systems and security tools are useless if employees bypass them.”

Henry Grow

Senior Consultant IT Security, Consist

Your contact

Joscha Sternadel, Portfoliomanager bei Consist

Joscha Sternadel

Portfolio Manager

phone: +49 431 3993-775

mobile: +49 162 2130358

e-mail: sternadel@consist.de

FAQs on IT Security

Doesn't data monitoring inevitably come at the expense of employee rights?

No, modern solutions take this into account by pseudonymizing the data.

Does every company need a SIEM?

It is not yet mandatory for every company. However, it makes it far easier to detect and prevent security incidents from various sources.

What is the best way for a company active in the field of critical infrastructures to meet the requirements of the GDPR?

With a solution that provides seamless documentation and at the same time works frugally with data.

Are employees really so frequently the trigger for data accidents or data theft?

Unfortunately, they are – both unconsciously as well as intentionally. Currently about 30% of security incidents are caused by employees.

Digital Transformation

Future-ready enterprise processes

IT Security

Security for your data

Managed Services

Software and systems in the best of hands