sits.com
Open in
urlscan Pro
35.157.26.13
Public Scan
Submitted URL: https://securedevice.dk/
Effective URL: https://sits.com/en/
Submission: On September 10 via automatic, source certstream-suspicious — Scanned from DK
Effective URL: https://sits.com/en/
Submission: On September 10 via automatic, source certstream-suspicious — Scanned from DK
Form analysis
1 forms found in the DOM<form>
<fieldset><!----><span class="brlbs-sr-only"></span>
<ul class="brlbs-cmpnt-consent-list">
<li class="">
<div data-v-c3c03228="" class="brlbs-flex brlbs-items-center"><input data-v-c3c03228="" id="essential" type="checkbox" name="essential" disabled="" class="brlbs-cmpnt-checkbox">
<div data-v-c3c03228="" class="brlbs-ml-3 brlbs-flex brlbs-items-start brlbs-flex-wrap"><label data-v-c3c03228="" for="essential" class="brlbs-cmpnt-label"><span data-v-c3c03228=""
class="brlbs-inline-block brlbs-align-middle">Essential</span> </label>
<p data-v-c3c03228="" class="brlbs-text-sm brlbs-w-full">Essential services enable basic functions and are necessary for the proper functioning of the website.</p>
</div>
</div>
</li>
<li class="">
<div data-v-c3c03228="" class="brlbs-flex brlbs-items-center"><input data-v-c3c03228="" id="marketing" type="checkbox" name="marketing" class="brlbs-cmpnt-checkbox">
<div data-v-c3c03228="" class="brlbs-ml-3 brlbs-flex brlbs-items-start brlbs-flex-wrap"><label data-v-c3c03228="" for="marketing" class="brlbs-cmpnt-label"><span data-v-c3c03228=""
class="brlbs-inline-block brlbs-align-middle">Marketing</span> </label>
<p data-v-c3c03228="" class="brlbs-text-sm brlbs-w-full">Marketing services are used by third-party providers or publishers to display personalized advertising. They do this by tracking visitors across websites.</p>
</div>
</div>
</li>
<li class="">
<div data-v-c3c03228="" class="brlbs-flex brlbs-items-center"><input data-v-c3c03228="" id="external-media" type="checkbox" name="external-media" class="brlbs-cmpnt-checkbox">
<div data-v-c3c03228="" class="brlbs-ml-3 brlbs-flex brlbs-items-start brlbs-flex-wrap"><label data-v-c3c03228="" for="external-media" class="brlbs-cmpnt-label"><span data-v-c3c03228="" class="brlbs-inline-block brlbs-align-middle">External
media</span> </label>
<p data-v-c3c03228="" class="brlbs-text-sm brlbs-w-full">Content from video platforms and social media platforms is blocked by default. If external services are accepted, manual consent is no longer required to access this content.</p>
</div>
</div>
</li>
</ul>
</fieldset>
</form>
Text Content
Skip to content Services Assessment & Advisory Risk Management & Assessment Vulnerability Management Attack Path Management Pentesting / PTaaS Business Continuity Management Exposure Assessment Information Security Management System (ISMS) Compliance Management Lifecycle Management Data Loss Prevention SecureAI Security Awareness Cyber Defense Cyber Defense Services SIEM Security Operations Center MXDR Cyber Threat Intelligence CSIRT Security & IT Solutions Applied Crypto File Folder Encryption Public Key Infrastructure Signing Services Workload and Network Security Zero Trust Network Access Next Gen Firewall Management Network Security & Solutions Workload Security SASE IAM IAM Access Management Identity Governance & Administration Privileged Access Management Cloud Platform Security Cloud Platform Security Cloud Security & Compliance Cloud Data Security Migration & Transformation Services All Services Solutions Microsoft Microsoft Identity & Access Management Modernization NIS2 NIS2 Assessment NIS2 for Microsoft About us About us Career Partner Media Center Media Center Blog Events & Webinars News Resources Request consultation * Global (english) * Germany (german) * Switzerland (german) Fighting AI attacks: How to protect data and systems Social engineering is as old as mankind – and still works remarkably well: this type of attack is based on gaining trust and getting the victim to do things they shouldn’t actually do: For example, revealing passwords or other sensitive information. Attackers are increasingly turning to so-called deepfakes. Read article NIS2 Whitepaper It’s not about the when, it’s about the how and what to do to be NIS2-compliant Download Consulting, Engineering, Operations & Managed Service SITS is your trusted partner for cyber security services and solutions This is us The SITS services from A to Z Our entire cyber security portfolio in a single place Portfolio Overview NIS2 Whitepaper It’s not about the when, it’s about the how and what to do to be NIS2-compliant Download Consulting, Engineering, Operations & Managed Service SITS is your trusted partner for cyber security services and solutions This is us The SITS services from A to Z Our entire cyber security portfolio in a single place Portfolio Overview NIS2 Whitepaper It’s not about the when, it’s about the how and what to do to be NIS2-compliant Download 01.This is us 02.Portfolio Overview 03.NIS2 Whitepaper Safeguard your digital landscape SITS SECURITY SUITE With a focus on holistic protection, we guide companies through the entire security lifecycle, from planning and building robust defenses to ongoing operational support. Cyber Defense At SITS, we specialize in cyber defense strategies that fortify your organization against evolving risks. Our teams of experts employs cutting-edge techniques and technologies to identify vulnerabilities, proactively detect threats, and swiftly respond to incidents. Our approach is not just about building walls; it's about creating resilient ecosystems where your data and operations remain secure, no matter the challenge. Assessment & Advisory Enhance security resilience with our Assessment & Advisory services. Mitigate risks, ensure compliance, and foster a vigilant workforce. Cloud Platform Security Secure your cloud journey with comprehensive solutions. From compliance to data security, we enable seamless migration and transformation. Security & IT Solutions Protect your data and workload networks with our Applied Crypto and Network Security services. Trust us to strengthen your protection against new threats. Identity & Access Management Unlock secure access with our Identity and Access Management services. From customer identity to privileged access, trust us to safeguard your digital gateways. Request Consultation OUR VISION IS A WORLD IN WHICH ALL DATA IS ADEQUATELY PROTECTED Our commitment In today’s digital age, where growth hinges on digitalization, security emerges as a paramount concern. We recognize the importance of simplicity in that fragmented market, striving to make the complex simple and accessible to all. At the heart of our mission is a dedication to our clients’ success. We operate as partners, guiding them on the journey from best of breed to best of suite in cyber security. Our expertise, coupled with top-tier consultative capabilities, ensures that every client receives the customized solutions they need. Moreover, we uphold core values that permeate everything we do. Simplicity, integrity, passion, perseverance, and customer centricity are not just words to us; they are the guiding principles that drive our actions every day. Together, let us navigate the digital realm with confidence, knowing that SITS is committed to keeping businesses running, data secure, and the world safer. About us AV-TEST | The independent IT-Test institute PROUD PART OF SITS Certification by AV-TEST AV-TEST analyzes security solutions for Windows, Android, MacOS and IoT for private users and companies. Rely on our expertise! Customized Tests AV-TEST offers individual tests and provides support with pre-release tests with Security by Design right from the product development stage. Threat Intelligence Real-time analysis data from AV-TEST provides companies with important information about active and potential threats, as well as TTPs and IOCs. AV-TEST Certificates and Awards AV-TEST seals are a key selling point. The certification promotes IT security and supports the optimization of products and services. It's that easy to assign and explain our portfolio NIST - The framework for more transparency The cyber security landscape is complex. For a better overview, we illustrate our portfolio using the NIST2 framework. Govern Empower your organization with robust governance to manage cybersecurity risks effectively. Identify Understand risks, develop targeted strategies, allocate resources effectively to protect against cyber threats. Protect Establish and execute protective measures to guarantee the provision of essential services. Detect Create and deploy procedures to detect cybersecurity incidents. Respond Establish and enact suitable measures to respond to identified cybersecurity threats. Recover Develop and implement activities to restore any capabilities or services impaired due to a cybersecurity incident. The Cyber Chronicle Newsroom We keep you posted with the latest news, data & trend topics NIS2 April 02, 2024 NIS2 & Risk Management: Are cyber risks really manageable? >>> Zero Trust April 02, 2024 Zero Trust - more IT Security through less trust >>> Cloud Platform Security March 28, 2024 Protective shield for your cloud platforms: Tips, Tricks, Pitfalls >>> Assessment & Advisory March 28, 2024 Security all-rounder CISO: Outsource or hire yourself? >>> September 06, 2024 Microsoft Sentinel as Azure SIEM - Benefits & Costs >>> AI April 16, 2024 Fighting AI attacks: How to protect data and systems >>> Assessment & Advisory April 15, 2024 ISO 27001 Certification without delay >>> Assessment & Advisory April 10, 2024 Managed Services to counter the shortage of manpower >>> Security & IT Solutions April 09, 2024 Workload Security with SASE, this is how it works >>> Cloud Platform Security April 09, 2024 DevOps security: Stress test for culture and technology >>> Identity & Access Management April 05, 2024 Biometrics - better security without passwords? >>> Cyber Defense April 05, 2024 Threat Intelligence - Knowledge is power & security >>> NIS2 April 05, 2024 NIS2 & ISO/IEC 27001:2022: New controls to fulfill both standards >>> Identity & Access Management April 05, 2024 How Privileged Access Management increases security >>> Assessment & Advisory April 05, 2024 vCISO - more IT Security through customizable support >>> AI Cloud Platform Security April 03, 2024 AI from Microsoft: Is your company Copilot Ready? >>> NIS2 April 02, 2024 NIS2 & Risk Management: Are cyber risks really manageable? >>> Zero Trust April 02, 2024 Zero Trust - more IT Security through less trust >>> Cloud Platform Security March 28, 2024 Protective shield for your cloud platforms: Tips, Tricks, Pitfalls >>> Assessment & Advisory March 28, 2024 Security all-rounder CISO: Outsource or hire yourself? >>> September 06, 2024 Microsoft Sentinel as Azure SIEM - Benefits & Costs >>> AI April 16, 2024 Fighting AI attacks: How to protect data and systems >>> Assessment & Advisory April 15, 2024 ISO 27001 Certification without delay >>> Assessment & Advisory April 10, 2024 Managed Services to counter the shortage of manpower >>> Security & IT Solutions April 09, 2024 Workload Security with SASE, this is how it works >>> Cloud Platform Security April 09, 2024 DevOps security: Stress test for culture and technology >>> Identity & Access Management April 05, 2024 Biometrics - better security without passwords? >>> Cyber Defense April 05, 2024 Threat Intelligence - Knowledge is power & security >>> NIS2 April 05, 2024 NIS2 & ISO/IEC 27001:2022: New controls to fulfill both standards >>> Identity & Access Management April 05, 2024 How Privileged Access Management increases security >>> Assessment & Advisory April 05, 2024 vCISO - more IT Security through customizable support >>> AI Cloud Platform Security April 03, 2024 AI from Microsoft: Is your company Copilot Ready? >>> NIS2 April 02, 2024 NIS2 & Risk Management: Are cyber risks really manageable? >>> Zero Trust April 02, 2024 Zero Trust - more IT Security through less trust >>> Cloud Platform Security March 28, 2024 Protective shield for your cloud platforms: Tips, Tricks, Pitfalls >>> Assessment & Advisory March 28, 2024 Security all-rounder CISO: Outsource or hire yourself? >>> 25% completed Get in touch now Contact us for customized security strategies. You are currently viewing a placeholder content from HubSpot. To access the actual content, click the button below. Please note that doing so will share data with third-party providers. Unblock content Accept required service and unblock content More Information About us In a complex, uncertain and risky world, we offer simplicity, consistency, excellent services and solutions. We are your responsible partner. You are our focus. You can rely on us. Company * About us * Career * Partner * Offices * Contact Mediacenter * Blog * Events & Webinars * News * Resources * Software Download Legal * Data privacy * Imprint * Compliance Our alliance partners Newsletter You are currently viewing a placeholder content from HubSpot. To access the actual content, click the button below. Please note that doing so will share data with third-party providers. Unblock content Accept required service and unblock content More Information * Global (english) * Germany (german) * Switzerland (german) Copyright © 2024 SITS Group Data protection preference We need your consent before you can continue to visit our website.If you are under the age of 16 and wish to give your consent to optional services, you must ask your parent or guardian for permission. We use cookies and other technologies on our website. Some of them are essential, while others help us to improve this website and your experience. Personal data may be processed (e.g. IP addresses), e.g. for personalized ads and content or the measurement of ads and content. You can find more information about the use of your data in our privacy policy. There is no obligation to consent to the processing of your data in order to use this offer. You can revoke or adjust your selection at any time under Settings. Please note that not all functions of the website may be available due to individual settings. Some services process personal data in the USA. By consenting to the use of these services, you also consent to the processing of your data in the USA in accordance with Art. 49 (1) lit. a GDPR. The ECJ classifies the USA as a country with inadequate data protection according to EU standards. For example, there is a risk that US authorities may process personal data in surveillance programs without Europeans having the right to take legal action. * Essential Essential services enable basic functions and are necessary for the proper functioning of the website. * Marketing Marketing services are used by third-party providers or publishers to display personalized advertising. They do this by tracking visitors across websites. * External media Content from video platforms and social media platforms is blocked by default. If external services are accepted, manual consent is no longer required to access this content. Accept all Save consent Accept essential cookies Individual preferences PreferencesPrivacy policyImprint