Security & Data Protection

Digital security in changing times

What do we do when everything is digital?
Data privacy and IT security are undoubtedly major challenges of our time. We support you with your secure systems.

We support you with your IT security issues. For years, IT security and data protection have been combined in one area of expertise at our company, which we take into account in all our projects. An interdisciplinary team of specially trained IT security and data protection experts from our company can provide you with comprehensive consulting on security issues. We carry out tests on your systems and check the security of your network using up-to-date techniques, methods and solution-oriented expert knowledge.

Our certified experts can also help with widely ramified process chains and complex issues. The different focus areas of our team help to examine the systems and infrastructures of our customers in different scenarios and to make them fit.

„Die Datenschutzbeauftragte von Assecor verfügt über ein ausgeprägtes Verständnis für unsere spezifischen Prozesse und Strukturen und bringt diese optimal mit den rechtlichen Anforderungen in Einklang. Darüber hinaus vermittelt sie das Thema sehr verständlich an unsere Mitarbeiter.“
Inga Kühn,
Senior Projektmanagerin Digital Solutions,
BEOS AG Berlin
Inga Kühn, Senior Projektmanagerin Digital Solutions, BEOS AG Berlin

Die BEOS AG profitiert von einem spezialisierten und zertifizierten Datenschutzbeauftragten, der individuell und in enger Abstimmung mit den Verantwortlichen des Unternehmens eingesetzt werden kann. Wir entwickelten gemeinsam mit dem Kunden unternehmenseigene Richtlinien, um die gesetzlichen Vorschriften adäquat im Unternehmen umzusetzen. Unsere Mitarbeiter arbeiten zukunftsorientiert und bringen sich aktiv ein. Unternehmen ermöglicht dies, Vertrauen zu Kunden und Mitarbeitern aufbauen und zu festigen.

IT Security Services
Support for ISO 27001 implementation
We are a certified ISO 27001 auditor
Also taking into account the IT security law (especially for the Kritis operators)
Taking over internal audits with the distance of an external service provider
Software and code review
We find, analyze and evaluate vulnerabilities
Training on secure software architectures
Design and implementation for training courses that meet the needs of the customer
Creation of technical concepts
Expertise in conceptual design for control centers and office communications
Official hacking ("white hacking") with a comprehensive final report
Commitment to ethical hacking
Penetration testing (according to BSI, OWASP, OSSTMM, EC Council)
Competence for 5 years
Optional: post-incident forensic investigations, digital traces retrieval
Support in the procurement of software and solutions
Recording and validation of IT security requirements with subsequent conceptual design
Testing of technical network components for certain relevant security aspects or specific conditions
Purchase consulting with a focus on security
Assecor's data protection officer has a strong understanding of our specific processes and structures and optimally aligns them with the legal requirements. In addition, she communicates the topic in a very understandable way to our employees.
Inga Kühn,
Senior Projektmanagerin Digital Solutions, Beos Ag Berlin
Inga Kühn, Senior Project Manager Digital Solutions, BEOS AG Berlin
Services Data Protection
Data protection for companies
We provide a data protection officer
We provide certified external data protection auditors
We advise on DSGVO processes
Trainings on data protection & DSGVO
Certified and with several years of experience, we are happy to help.
OCS as an awareness tool
Classification of confidentiality of data and documents according to the "need-to-know" principle
Facilitates information processing and distribution
An awareness tool programmed by us for Microsoft products
Individual applications, competencies & certifications
Data protection for companies
IT basic protection according to BSI 2 (smlan)
Data protection officer (TÜV NORD)
Certified Ethical Hacker (EC-Council)
ISMS ISO/IEC 27001 Foundation (TÜV-SÜD)
ISMS ISO/IEC 27001 Information Security Officer (TÜV-SÜD)
ISMS ISO/IEC 27001 Auditor (TÜV-SÜD)
To the overview of services