Managed Services

The web has developed into an indispensable medium. Thus, more and more business processes take place on the Internet: from the search for information or social networking to communication with authorities, online shopping, and Internet banking. All these applications are realised in the background by web applications. Due to their global accessibility, they are considered a popular target for professional hackers. Compressed applications may thus be misused for most different purposes, as e.g. spam attacks or botnets.

Especially for those responsible for IT or applications, resp., it is therefore decisive to detect risks early on and to always keep an eye on their development. In that, the dynamic threat situation and new methods of attack require application protection exceeding a classic security audit by far.

  • Erhalten Sie die aktuellsten sicherheitsrelevanten Informationen für Ihre Applikationen.
  • Stellen Sie sicher, dass Ihre Applikationen regelmäßig getestet werden.
  • Profitieren Sie von individuell zugeschnittenen Service Levels.

AppSecMon − Keeping an eye on security

With Application Security Monitoring (AppSecMon), companies obtain the necessary tool for active and permanent monitoring of applications and the associated infrastructure for security gaps. Contrary to selective penetration tests, application managers do not obtain a snapshot, but a constantly updated risk assessment adapted to the current threat situation.

MVIS – Your control centre for security gaps

MVIS supports those responsible for security with the task of detecting security gaps in time, even before any misuse can occur. The process from weaknesses being detected up to concrete measures being implemented is covered by the MVIS service. Active and permanent monitoring of software products used for security gaps is thus guaranteed.

Overview

  • Manual and automatic security reviews
  • Standardised approach
  • Integration into existing processes, like IT operation, development, etc.
  • Different service levels, depending on protection needs (incl. service level DDoS)
  • Reporting in existing systems, e.g. SIEM, Risk2Value

Overview

  • Automatic screening and pre-selection of weaknesses for defined products
  • Manual validation of the selected weaknesses
  • Forwarding to defined contacts
  • Risk assessment and individual suggestions for solution for relevant weaknesses
Spot potential risks before it is too late.

Cookie Preference

Please select an option. You can find more information about the consequences of your choice at Help.

Select an option to continue

Your selection was saved!

Help

Help

To continue, you must make a cookie selection. Below is an explanation of the different options and their meaning.

  • Accept all cookies:
    All cookies such as tracking and analytics cookies.
  • Accept first-party cookies only:
    Only cookies from this website.
  • Reject all cookies:
    No cookies except for those necessary for technical reasons are set.

You can change your cookie setting here anytime: Privacy Statement. Legal Notice

Back