
Implementing IT security measures
We secure your IT infrastructure – for stability when in operation, and resilience in an emergency.
A security concept is just the foundation. But IT security can only be effective if measures are implemented correctly, tested and embedded on an operational level. And that’s where we've got your back! We implement technical and organisational security components, reduce exposure to attacks and ensure that the documentation and the handover are streamlined. We put reliable and effective measures in place in your environment – whether on-prem, hybrid or in the cloud. And if you’re thinking of going cloud first, our focus will be on providing a secure cloud transformation, with particular attention to Microsoft 365 and Azure.
Making technologies usable
Which IT security measures do we typically deploy?
Depending on the initial situation and your target vision, our measures are deployed in the form of clearly defined implementation packages. We typically focus on:
1) Phishing-resistant multi-factor authentication (MFA)
2) Roles & authorisation concepts (incl. admin rights)
3) Access guidelines (conditional access) for cloud and hybrid scenarios
1) Guidelines and standard settings that are secure
2) Update/patch processes & handling of outdated components
3) Basic protection for servers, clients & essential Services
1) Protecting emails & end-user devices (platform-dependent)
2) Reducing typical attack routes (e.g. rights set too broadly, uncertain releases)
3) Protecting sensitive data using clear rules & technical measures
1) Appropriate record-keeping (logs) & alerts
2) Clearly defined response pathways: who will respond to what and when?
3) If needed: central evaluation & security overviews
1) Protecting backups & making sure they are stored separately (to prevent backups becoming encrypted)
2) Carrying out restore tests
3) Defining emergency & re-initiation processes in a practical way
Note: Our focus is on implementation, configuration and operability. We do not offer penetration tests.
How we work
Here’s how we implement your IT security measures
What you will get at the end: security components that mean business
The implementation you receive is not only activated, but handed over ready for you to take control:
Security architecture for unitop: roles, access & operations
When introducing and operating unitop – based on Microsoft Dynamics 365 Business Central – we take a holistic view of the security requirements right from the start. On the Microsoft platform, tried-and-tested security mechanisms can be used in conjunction with Microsoft 365 and Azure in a targeted way, to set up your unitop environment stably and securely. These include the following components:
Contact
Your contact when implementing IT security measures
Are you not only looking to plan security measures, but implement them in a streamlined way – including testing, documentation and operational handover? We’ll be pleased to advise you and work with you to clarify what steps make most sense for your environment.
