secaas.it Open in urlscan Pro
85.13.162.99  Public Scan

Submitted URL: http://secaas.it/
Effective URL: https://secaas.it/en/
Submission: On April 03 via manual from DE — Scanned from IT

Form analysis 2 forms found in the DOM

Name: wf-form-Kontakt-Form---MaaS

<form id="wf-form-Kontakt-Form---MaaS" name="wf-form-Kontakt-Form---MaaS" data-name="Kontakt Form - MaaS"></form>

Name: TelefonnummerPOST

<form class="elementor-form" method="post" name="Telefonnummer">
  <input type="hidden" name="post_id" value="13141">
  <input type="hidden" name="form_id" value="692107c7">
  <input type="hidden" name="referer_title" value="SECaaS.IT - Security as a Service | start page">
  <input type="hidden" name="queried_id" value="13141">
  <div class="elementor-form-fields-wrapper elementor-labels-above">
    <div class="elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_d75b208 elementor-col-100">
      <label for="form-field-field_d75b208" class="elementor-field-label"> Name </label>
      <input size="1" type="text" name="form_fields[field_d75b208]" id="form-field-field_d75b208" class="elementor-field elementor-size-sm  elementor-field-textual">
    </div>
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required">
      <label for="form-field-email" class="elementor-field-label"> Email </label>
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm  elementor-field-textual" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100">
      <label for="form-field-message" class="elementor-field-label"> Message </label>
      <textarea class="elementor-field-textual elementor-field  elementor-size-sm" name="form_fields[message]" id="form-field-message" rows="4"></textarea>
    </div>
    <div class="elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_cf75774 elementor-col-100 elementor-field-required">
      <div class="elementor-field-subgroup">
        <span class="elementor-field-option">
          <input type="checkbox" name="form_fields[field_cf75774]" id="form-field-field_cf75774" class="elementor-field elementor-size-sm  elementor-acceptance-field" required="required" aria-required="true">
          <label for="form-field-field_cf75774">I have read the <a target="_blank" href="https://secaas.it/datenschutz/">Data Protection Policy</a> and agree to it</label> </span>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
      <button type="submit" class="elementor-button elementor-size-sm">
        <span>
          <span class=" elementor-button-icon">
          </span>
          <span class="elementor-button-text">Send</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

 * About Us
 * Emergency
 * Initial Consultation
 * Contact

Menu
 * About Us
 * Emergency
 * Initial Consultation
 * Contact


 * DE
 * EN

 * About Us
 * Emergency
 * Initial Consultation
 * Contact

Menu
 * About Us
 * Emergency
 * Initial Consultation
 * Contact


 * DE
 * EN


THE SECURITY EXPERTS FOR


— PEOPLE, TECHNOLOGY, ORGANISATION


INFORMATION SECURITY MANAGEMENT : SIMPLE, STRATEGIC, SUSTAINABLE








OUR GOALS FOR YOU


ENSURE OPERATIONAL CAPABILITIES IN AN EMERGENCY


YOUR ADVANTAGES AT A GLANCE





REDUCTION OF EFFORTS

Save up to 80% of the effort required to implement an ISMS by using tried and
tested guidelines




READY FOR USE - IMMEDIATELY

Our implementation guides allow you to implement and use elements immediately in
daily operations – no implementation process necessary




PROVIDES LOGICAL TRANSPARENCY

Through our implementation, we ensure that employees are openly informed about
the process




DIRECT ABILITY FOR EMPLOYEES TO TAKE ACTION

We ensure that your employees are immediately ready to act and are armed with
all necessary knowledge and information




NO MORE FEAR OF THE UNKNOWN

With our support, you and your employees will lose your fear of the unknown, and
with that –  gain control over your information security







UNSER ZIEL FÜR SIE


HANDLUNGSFÄHIGKEIT IM NOTFALL SICHERSTELLEN


IHRE VORTEILE AUF EINEN BLICK:





REDUKTION DER AUFWÄNDE

Sparen Sie durch vielfach erprobte Leitfäden bis zu 80% an Aufwänden, um eine
ISMS-Implementierung operativ umzusetzen





SOFORTIGE NUTZBARKEIT

Durch unsere Implementierungsleitfäden können Sie die Elemente sofort in
täglichen Betrieb einsetzen, kein Einführungsproiekt notwendig





SCHAFFT VERSTÄNDLICHE TRANSPARENZ

Durch unsere Implementierung sorgen wir dafür, dass Mitarbeiter transparent über
das Vorgehen informiert werden





SOFORTIGE NUTZBARKEIT

Wir sorgen dafür, dass Ihre Mitarbeiter direkt handlungsfähig sind und das
notwendige Wissen vermittelt wird





KEINE ANGST VOR UNBEKANNTEN

Durch unsere Implementierung sorgen wir dafür, dass Mitarbeiter transparent über
das Vorgehen informiert werden




OUR GUIDING PRINCIPLE


SECURE DIGITALISATION IN HARMONY WITH PEOPLE, TECHNOLOGY, ORGANISATION



The three facets of digitization, knowledge management and information security
define and secure the future for our customers.

For the meaningful and secure transformation of companies and organizations into
a sustainable and successful future, we combine these topics and methods in a
goal-oriented and effective manner. We listen carefully, understand you and your
business.  With us, everything becomes easier.

We start with an anamnesis workshop to determine the IT and Information Security
Status.  Based on the insights gained there, we define measures together.

We align possibilities and their uniqueness to maximize the benefits for you.

Want to learn more?
Linkedin Xing Youtube



UNSER LEITBILD


— SICHERE DIGITALISIERUNG IM DREIKLANG VON MENSCH, TECHNIK, ORGANISATION



Die drei Facetten Digitalisierung, Wissensmanagement und Informationssicherheit
bestimmen und sichern die Zukunft unserer Kunden.

Für die sinnvolle und sichere Transformation von Unternehmen und Organisationen
in eine
nachhaltige, erfolgreiche Zukunft kombinieren wir diese Themen und Methoden
zielorientier und effektiv. Wir hören gut zu, verstehen Sie und Ihr Geschäft;
mit uns wird alles einfacher. 

Wir beginnen mit einem Anamnese Workshop zur Ermittlung des IT- und
Informationssicherheitsstatus. Basierend auf den dort erlangten Erkenntnissen
definieren wir gemeinsam Maßnahmen.

Wir bringen die Möglichkeiten und ihre Individualität in Einklang, um den
maximalen Nutzen für Sie herauszuholen.

Sie möchten mehr über uns erfahren?
Linkedin Xing Youtube



DO YOU KNOW HOW YOUR CYBER-SECURITY IS DOING?




IS YOUR INFORMATION SECURITY UP TO PAR?


TAKE A LITTLE TIME





FOR REPORTING AND ACTION DIRECTIVES IN THE CONTEXT OF CYBERSECURITY





FOR A SECURE FUTURE

Cyber Risk Check


TAKE THE FREE CYBER RISK CHECK ACCORDING TO DIN SPEC 27076

Schedule an Appointment


THE SIMPLE NEW TOOL

check your possibilities


ANAMNESIS-WORKSHOP

We will develop your strategy and your personal roadmap

Does IT Security seem like a mountain? You are facing it and  feeling lost?    

Where do we begin, and what way do we take to reach the summit?

Protect your company from digital threats! Book our Anamnesis Workshop on
cybersecurity, gain transparency about your company’s situation, and receive
clear actionable directives for the next steps in safeguarding against hacker
attacks

Download


FOR A SECURE FUTURE

CHECK your possibilities

IN ADDITION, WE OFFER THE FOLLOWING PRODUCTS AND SERVICES:


PEN TESTING



With an initial penetration test, we identify vulnerable attack points and
derive initial action insights.

Download


PHISING CAMPAIGN



Through a Phishing-Campaign we check people’s Awareness within the Organisation
/ the customer’s Organisation.

Download


WATCHDOG



Our watchdog provides transparency on all local computers/servers, network
devices, patch levels in cloud services, configurations, security
vulnerabilities etc. It is designed for the continuous monitoring of  technical
infrastructure.

Download


MANAGEMENT SYSTEM DEVELOPMENT



The establishment of an efficient and sustainable Management System for
Information Security and, if required, other Governance themes (ISO 27001, ISO
9001, etc.) rounds off our portfolio.

Download


DATA PROTECTION AS A SERVICE



Get a secure concept tailored to the requirements of GDPR (DSVGO) and other IT
compliance regulations. Book your external data protection officer here.

Download



GAIN TRANSPARENCY AND SECURITY WITH US!




WITH OUR SUPPORT, YOU GAIN TRANSPARENCY INTO YOUR IT PROCESSES AND NECESSARY
MEASURES YOU NEED TO TAKE TO ENHANCE YOUR RESILIENCE. THIS POSITIONS YOU
STRONGLY FOR POTENTIAL IT SECURITY INCIDENTS. WE ASSIST YOU IN ENSURING THAT
YOUR EMPLOYEES BUILD KNOWLEDGE AND STAY INFORMED ABOUT IT SECURITY, PREVENTING
YOUR COMPANY FROM BLINDLY FALLING INTO DIFFICULTIES AND THEREBY AVERTING MAJOR
HARM. TAKE ADVANTAGE OF OUR EXPERTISE. BOOK A FREE AND NON-BINDING INITIAL
CONSULTATION NOW, AND LET'S SEE HOW WE CAN ASSIST YOU.

BOOK YOUR NON-BINDING INITIAL CONSULTATION

Contact us now

Linkedin Xing Youtube
Hier gehts zu den Tickets

SECURITY AS A SERVICE


SECURITY-AS-A-SERVICE (SECAAS) IS OUR ANSWER FOR AN INNOVATIVE SUPPORT SERVICE
IN IT SECURITY. COMPANIES CAN BOOK INDIVIDUAL SERVICES AS NEEDED. "EVERYTHING IS
STRAIGHTFORWARD AND EXPANDABLE ACCORDING TO YOUR OWN NEEDS, AND AVAILABLE AS A
SUBSCRIPTION MODEL."

Why Security-as-a-Service (SECaaS)?

The development, implementation, and optimization of digital business models is
becoming increasingly essential for many companies as a key component of their
competitive advantage. It requires new capabilities to ensure the security of
complex IT infrastructure, which forms the foundation of all business areas.

Traditional IT security strategies often focus on processes and tools. 

‘Modern IT security places people at the center of the action, aiming to
optimize IT security awareness.’

In agile organizations, significant productivity improvements are possible. We
operate entirely agile to provide these benefits to our customers in terms of
speed and quality in our services.

With Security-as-a-Service (SECaaS), we offer our capabilities and best
practices in pragmatic service packages as a monthly subscription. This allows
companies to book individual IT security services with us or completely
outsource their IT security needs.

What services can you expect?

At the beginning of each Security-as-a-Service engagement, we start with a
personalized service onboarding. During this process, we discuss specific
challenges with you, share activities already undertaken and document your
individual expectations of us.

Subsequently, potential services from our service catalog are discussed and
linked to your challenges to find solutions.

Key components of our service include emergency preparedness, complete overview,
network security, data backup, updates, password + cryptography, system
security, user management, security mindset, training, logging / time
synchronization, infrastructure security, best practices, and compliance.

Regarding the Future of Hospitals Act (KHZG), we are a certified service
provider and are happy to assist you with the application and implementation of
your project.

What do we mean by our services?

Overview | How are you positioned?

Have all critical data and processes been identified, and have corresponding
protection needs been addressed? What are the IT security requirements, which
measures need to be prioritized for implementation, and how is the roadmap and
responsibility defined for them?

 

Emergency Preparedness | What to Do When an Emergency Occurs?

Are emergencies identifiable, and do plans for emergency preparedness and
response exist? Are responsibilities defined, and are those responsible capable
of taking action? Do you and your employees know what to do in case of an
emergency? Are the most important procedures known?

 

Evaluation of Compromises | Do You Monitor for Intrusions in Your System?

Are attempted attacks and compromised systems reliably detected?

 

Security Mindset, Training & Security Awareness is Key.

What priorities have been set regarding IT security, and what focus is being
pursued? What is the budget for IT security and related training? Which measures
have been successfully implemented? Is there a knowledge portal, regular
teasers, and effectiveness assessments to actively promote security awareness
among all stakeholders?

 

Planning and Implementation – Planning is Half the Battle.

Within the framework of a risk analysis, identified measures are planned, and we
support their implementation and execution.

 

Network Security

What processes and measures are in place to support network security? How are
anomalies detected, communicated, and addressed?

 

Patch Management

Updates are crucial and require proper attention. 

What processes are in place for software maintenance and updates?

 

Data Backup – No Backup, No Sympathy

Are backups secure from deletion and manipulation over the network? Is
restoration regularly tested?

 

Password + Cryptography | “123456” is Not a Password

What policies exist for passwords, (privileged) user accounts, 2-factor
authentication, encryption (e.g., mobile devices)? How are these policies
enforced?

 

System Security – Be Tough

What methodologies are used to harden systems?

 

User Management | Not Everyone Should See Everything

How is user management implemented, and what hierarchies, protective mechanisms,
and processes are actively in use?

 

Logging / Time Synchronization

For investigating security incidents, seamless and accurate recording of log
files is crucial. What methodologies and processes are in place for this
purpose?

 

Infrastructure Security | EKG of the Infrastructure

Is there adequate protection for your IT systems against fundamental threats?
How is appropriate access control ensured?

 

Compliance with Legal / Normative Requirements | §§§

Have the requirements of regulations such as the IT Security Act 2.0, BSI Basic
Protection (BSIG §8a), ISO/IEC 2700x, Norm 62443, TISAX, KRITIS requirements, or
B3S been fulfilled?

 

Implementation and Establishment of an ISMS

We support the implementation and establishment of an Information Security
Management System (ISMS) following standards like ISO 27001.

 

Setting Up Security Monitoring | Knowing What’s Going On – Around the Clock

The implemented measures are integrated into monitoring to promptly inform
stakeholders about incidents and report accordingly.

 

Support – You’re Not Alone, We’re Here for You

We, as service providers, plan and support the ongoing operation and necessary
adjustments.

 

What happens during the service onboarding/anamnesis workshop?

During the Service Onboarding/Anamnesis Workshop, we will establish the
framework for your IT security, either in person where possible or via video
conferencing if necessary. Essential requirements and priorities will be
determined to ensure the success of our services and your IT security to the
best possible extent. Additionally, we will discuss your wishes, challenges, and
needs for a successful collaboration, all of which will be integrated into the
service.

 

Satisfaction guarantee and hidden costs?

Our SECaaS team operates in an agile and digitally-oriented manner, allowing us
to deliver high-quality service and work pragmatically with our clients.

In our service delivery, we utilize an NPS (Net Promoter Score) scoring system.
This enables us to systematically understand your expectations and provide
necessary suggestions for improvement.

If our service does not meet your expectations, we are willing to end the
collaboration without any additional consequences for both parties and without
harm. Through our transparent approach, we emphasize that there are no hidden
costs involved. When you engage with us, you are booking your individual service
package, and we will deliver the promised results.

 

CONTACT US!

You would like to learn more about Security as a Service?

Leave your email and we will contact you



SECaaS – Security as a Service

XaaS Enterprise GmbH

Sebastian-Kneipp-Straße 41

60439 Frankfurt

+49 89 2080 44474
hello@SECaaS.IT

Name
Email
Message
I have read the Data Protection Policy and agree to it
Send

Linkedin Xing Youtube
 * Security as a Service
 * Emergency
 * About Us
 * Contact

 * Impressum
 * Data Protection Policy

Copyright 2023 Theumert Consulting GmbH
All rights reserved.


This site uses third-party website tracking technologies to provide and
continually improve our services, and to display advertisements according to
users' interests. I agree and may revoke or change my consent at any time with
effect for the future.

Deny Accept more

Powered by
Usercentrics Consent Management Platform Logo
&