Security Checkup - Clear IT Security Assessment

Have you had little interaction with information security so far, but would like to take action and protect your company? Then our Information Security Checkup is just the thing for you! We have developed a standardized questionnaire that gives a quick impression of the maturity level of your information security.
It represents an efficient option for initial risk detection.

Maturity Analysis for SMEs & Start-ups

Target Audience of the Checkup

We offer the checkup to small and medium-sized enterprises in the DACH region to demonstrate without obligation the current state of maturity and to give recommendations for action. This category also includes most scale-ups and start-ups!

The SME definition includes all companies with the following criteria:

  • Number of employees: up to 249
  • Annual turnover up to 50 million EUR

A security checkup is an essential tool for companies of all industries to systematically assess IT security and identify vulnerabilities early on. However, the application and requirements vary depending on the industry and sensitivity of the data processed. A security checkup is also necessary in other sensitive areas such as banks, insurance companies, the healthcare sector, energy supply, or public administration.

If your company is slightly above this, please contact us anyway. The SME definition serves as a guideline.

As part of a maturity analysis, we look at all relevant security areas - from technology to organization to processes - in a structured way. In the analysis, we follow recognized standards such as ISO 27001 and BSI basic protection and use standardized questionnaires as well as interviews with those responsible. The evaluation is based on maturity levels ranging from "unregulated" to "optimizing". The higher the level of maturity, the more mature and effective are the security processes and risk management.

A security checkup with maturity analysis provides you with a clear overview of strengths, weaknesses, and areas for development. The results are documented in a report, which forms the basis for an action plan that specifically further develops the security strategy.

Illustration of security management services

Transparency about your IT security level

Classification into Protection Requirement Classes

The protection requirement determination assesses how critical certain information, systems, or processes are for your company. Classification is usually done in three protection requirement categories:

  • Normal: Impairments are limited and manageable, financial damages remain tolerable, downtimes are acceptable.
  • High: The impacts are substantial, such as significant financial losses, legal consequences, or severe disruption of business processes.
  • Very high: The consequences are existential or catastrophic, such as massive data losses, damage to reputation, or harm to life and limb.

The protection requirement determination is carried out separately for the basic values of confidentiality, integrity, and availability. For each category, we consider typical damage scenarios, such as financial damages, legal consequences, impairment of task fulfillment, or negative external impact. The protection requirement class determines which security measures are at least necessary.
With the combination of maturity rating and protection requirement classification, we achieve targeted prioritization: We primarily address critical vulnerabilities in areas with very high protection requirements.

Illustration of security architecture

References

Toyota
dkb
R+V BKK
State Bank of India
Clark
Metzler

Transparency about your IT security level

What is the Security Check Suitable for?

Securing the entire attack surface of an organization is becoming increasingly challenging due to the enhanced use of cloud systems, complex supply chains, and the steadily growing IT infrastructure of third-party providers.
Our Security Checkup aims to help quickly identify cyber risks and provide the basis for optimizing IT security.
The checkup essentially consists of questions taken from our extensive catalog of questions. We align ourselves with the BSI IT Baseline Protection or DIN/ISO 27001 (ISO 27001).
The condensed questionnaire for our checkup is designed to quickly and easily provide an initial snapshot of the current state of your information security.
Especially as a starting point, our checkup is suitable for getting to know each other. You also benefit from being able to take something in black and white for further rounds of discussions in your company to plan further steps.

Illustration of security process monitoring

Contact

Curious? Convinced? Interested?

Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment:

Please send me the free sample report.
Please send me more information.
I would like to subscribe to the newsletter and receive further information at the email address provided.
I consent to the use and processing of my personal data provided for the purpose of handling my inquiry.*