sits.com Open in urlscan Pro
35.157.26.13  Public Scan

Submitted URL: https://securedevice.dk/
Effective URL: https://sits.com/en/
Submission: On September 10 via automatic, source certstream-suspicious — Scanned from DK

Form analysis 1 forms found in the DOM

<form>
  <fieldset><!----><span class="brlbs-sr-only"></span>
    <ul class="brlbs-cmpnt-consent-list">
      <li class="">
        <div data-v-c3c03228="" class="brlbs-flex brlbs-items-center"><input data-v-c3c03228="" id="essential" type="checkbox" name="essential" disabled="" class="brlbs-cmpnt-checkbox">
          <div data-v-c3c03228="" class="brlbs-ml-3 brlbs-flex brlbs-items-start brlbs-flex-wrap"><label data-v-c3c03228="" for="essential" class="brlbs-cmpnt-label"><span data-v-c3c03228=""
                class="brlbs-inline-block brlbs-align-middle">Essential</span> </label>
            <p data-v-c3c03228="" class="brlbs-text-sm brlbs-w-full">Essential services enable basic functions and are necessary for the proper functioning of the website.</p>
          </div>
        </div>
      </li>
      <li class="">
        <div data-v-c3c03228="" class="brlbs-flex brlbs-items-center"><input data-v-c3c03228="" id="marketing" type="checkbox" name="marketing" class="brlbs-cmpnt-checkbox">
          <div data-v-c3c03228="" class="brlbs-ml-3 brlbs-flex brlbs-items-start brlbs-flex-wrap"><label data-v-c3c03228="" for="marketing" class="brlbs-cmpnt-label"><span data-v-c3c03228=""
                class="brlbs-inline-block brlbs-align-middle">Marketing</span> </label>
            <p data-v-c3c03228="" class="brlbs-text-sm brlbs-w-full">Marketing services are used by third-party providers or publishers to display personalized advertising. They do this by tracking visitors across websites.</p>
          </div>
        </div>
      </li>
      <li class="">
        <div data-v-c3c03228="" class="brlbs-flex brlbs-items-center"><input data-v-c3c03228="" id="external-media" type="checkbox" name="external-media" class="brlbs-cmpnt-checkbox">
          <div data-v-c3c03228="" class="brlbs-ml-3 brlbs-flex brlbs-items-start brlbs-flex-wrap"><label data-v-c3c03228="" for="external-media" class="brlbs-cmpnt-label"><span data-v-c3c03228="" class="brlbs-inline-block brlbs-align-middle">External
                media</span> </label>
            <p data-v-c3c03228="" class="brlbs-text-sm brlbs-w-full">Content from video platforms and social media platforms is blocked by default. If external services are accepted, manual consent is no longer required to access this content.</p>
          </div>
        </div>
      </li>
    </ul>
  </fieldset>
</form>

Text Content

Skip to content
Services
Assessment & Advisory
Risk Management & Assessment
Vulnerability Management
Attack Path Management
Pentesting / PTaaS
Business Continuity Management
Exposure Assessment
Information Security Management System (ISMS)
Compliance Management
Lifecycle Management
Data Loss Prevention
SecureAI
Security Awareness
Cyber Defense
Cyber Defense Services
SIEM
Security Operations Center
MXDR
Cyber Threat Intelligence
CSIRT
Security & IT Solutions
Applied Crypto
File Folder Encryption
Public Key Infrastructure
Signing Services
Workload and Network Security
Zero Trust Network Access
Next Gen Firewall Management
Network Security & Solutions
Workload Security
SASE
IAM
IAM
Access Management
Identity Governance & Administration
Privileged Access Management
Cloud Platform Security
Cloud Platform Security
Cloud Security & Compliance
Cloud Data Security
Migration & Transformation Services
All Services
Solutions
Microsoft
Microsoft Identity & Access Management Modernization
NIS2
NIS2 Assessment
NIS2 for Microsoft
About us
About us
Career
Partner
Media Center
Media Center
Blog
Events & Webinars
News
Resources
Request consultation

 * Global (english)
   * Germany (german)
   * Switzerland (german)

Fighting AI attacks: How to protect data and systems


Social engineering is as old as mankind – and still works remarkably well: this
type of attack is based on gaining trust and getting the victim to do things
they shouldn’t actually do: For example, revealing passwords or other sensitive
information. Attackers are increasingly turning to so-called deepfakes.
Read article


NIS2 Whitepaper
It’s not about the when, it’s about the how and what to do to be NIS2-compliant


Download

Consulting, Engineering, Operations & Managed Service
SITS is your trusted partner for cyber security services and solutions


This is us

The SITS services from A to Z
Our entire cyber security portfolio in a single place


Portfolio Overview

NIS2 Whitepaper
It’s not about the when, it’s about the how and what to do to be NIS2-compliant


Download

Consulting, Engineering, Operations & Managed Service
SITS is your trusted partner for cyber security services and solutions


This is us

The SITS services from A to Z
Our entire cyber security portfolio in a single place


Portfolio Overview

NIS2 Whitepaper
It’s not about the when, it’s about the how and what to do to be NIS2-compliant


Download

01.This is us

02.Portfolio Overview

03.NIS2 Whitepaper



Safeguard your digital landscape


SITS SECURITY SUITE

With a focus on holistic protection, we guide companies through the entire
security lifecycle, from planning and building robust defenses to ongoing
operational support.

Cyber Defense
At SITS, we specialize in cyber defense strategies that fortify your
organization against evolving risks. Our teams of experts employs cutting-edge
techniques and technologies to identify vulnerabilities, proactively detect
threats, and swiftly respond to incidents. Our approach is not just about
building walls; it's about creating resilient ecosystems where your data and
operations remain secure, no matter the challenge.

Assessment & Advisory
Enhance security resilience with our Assessment & Advisory services. Mitigate
risks, ensure compliance, and foster a vigilant workforce.
Cloud Platform Security
Secure your cloud journey with comprehensive solutions. From compliance to data
security, we enable seamless migration and transformation.
Security & IT Solutions
Protect your data and workload networks with our Applied Crypto and Network
Security services. Trust us to strengthen your protection against new threats.

Identity & Access Management
Unlock secure access with our Identity and Access Management services. From
customer identity to privileged access, trust us to safeguard your digital
gateways.

Request Consultation




OUR VISION IS A WORLD IN WHICH ALL DATA IS ADEQUATELY PROTECTED

Our commitment
In today’s digital age, where growth hinges on digitalization, security emerges
as a paramount concern. We recognize the importance of simplicity in that
fragmented market, striving to make the complex simple and accessible to all.

At the heart of our mission is a dedication to our clients’ success. We operate
as partners, guiding them on the journey from best of breed to best of suite in
cyber security. Our expertise, coupled with top-tier consultative capabilities,
ensures that every client receives the customized solutions they need.

Moreover, we uphold core values that permeate everything we do. Simplicity,
integrity, passion, perseverance, and customer centricity are not just words to
us; they are the guiding principles that drive our actions every day.

Together, let us navigate the digital realm with confidence, knowing that SITS
is committed to keeping businesses running, data secure, and the world safer.

About us



AV-TEST | The independent IT-Test institute


PROUD PART OF SITS


Certification by AV-TEST
AV-TEST analyzes security solutions for Windows, Android, MacOS and IoT for
private users and companies. Rely on our expertise!
Customized Tests
AV-TEST offers individual tests and provides support with pre-release tests with
Security by Design right from the product development stage.
Threat Intelligence
Real-time analysis data from AV-TEST provides companies with important
information about active and potential threats, as well as TTPs and IOCs.
AV-TEST Certificates and Awards
AV-TEST seals are a key selling point. The certification promotes IT security
and supports the optimization of products and services.


It's that easy to assign and explain our portfolio
NIST - The framework for more transparency
The cyber security landscape is complex. For a better overview, we illustrate
our portfolio using the NIST2 framework. 

Govern
Empower your organization with robust governance to manage cybersecurity risks
effectively.
Identify
Understand risks, develop targeted strategies, allocate resources effectively to
protect against cyber threats.
Protect
Establish and execute protective measures to guarantee the provision of
essential services.
Detect
Create and deploy procedures to detect cybersecurity incidents.
Respond
Establish and enact suitable measures to respond to identified cybersecurity
threats.
Recover
Develop and implement activities to restore any capabilities or services
impaired due to a cybersecurity incident.


The Cyber Chronicle Newsroom
We keep you posted with the latest news, data & trend topics


NIS2
April 02, 2024
NIS2 & Risk Management: Are cyber risks really manageable?
>>>

Zero Trust
April 02, 2024
Zero Trust - more IT Security through less trust
>>>

Cloud Platform Security
March 28, 2024
Protective shield for your cloud platforms: Tips, Tricks, Pitfalls
>>>

Assessment & Advisory
March 28, 2024
Security all-rounder CISO: Outsource or hire yourself?
>>>


September 06, 2024
Microsoft Sentinel as Azure SIEM - Benefits & Costs
>>>

AI
April 16, 2024
Fighting AI attacks: How to protect data and systems
>>>

Assessment & Advisory
April 15, 2024
ISO 27001 Certification without delay
>>>

Assessment & Advisory
April 10, 2024
Managed Services to counter the shortage of manpower
>>>

Security & IT Solutions
April 09, 2024
Workload Security with SASE, this is how it works
>>>

Cloud Platform Security
April 09, 2024
DevOps security: Stress test for culture and technology
>>>

Identity & Access Management
April 05, 2024
Biometrics - better security without passwords?
>>>

Cyber Defense
April 05, 2024
Threat Intelligence - Knowledge is power & security
>>>

NIS2
April 05, 2024
NIS2 & ISO/IEC 27001:2022: New controls to fulfill both standards
>>>

Identity & Access Management
April 05, 2024
How Privileged Access Management increases security
>>>

Assessment & Advisory
April 05, 2024
vCISO - more IT Security through customizable support
>>>

AI
Cloud Platform Security
April 03, 2024
AI from Microsoft: Is your company Copilot Ready?
>>>

NIS2
April 02, 2024
NIS2 & Risk Management: Are cyber risks really manageable?
>>>

Zero Trust
April 02, 2024
Zero Trust - more IT Security through less trust
>>>

Cloud Platform Security
March 28, 2024
Protective shield for your cloud platforms: Tips, Tricks, Pitfalls
>>>

Assessment & Advisory
March 28, 2024
Security all-rounder CISO: Outsource or hire yourself?
>>>


September 06, 2024
Microsoft Sentinel as Azure SIEM - Benefits & Costs
>>>

AI
April 16, 2024
Fighting AI attacks: How to protect data and systems
>>>

Assessment & Advisory
April 15, 2024
ISO 27001 Certification without delay
>>>

Assessment & Advisory
April 10, 2024
Managed Services to counter the shortage of manpower
>>>

Security & IT Solutions
April 09, 2024
Workload Security with SASE, this is how it works
>>>

Cloud Platform Security
April 09, 2024
DevOps security: Stress test for culture and technology
>>>

Identity & Access Management
April 05, 2024
Biometrics - better security without passwords?
>>>

Cyber Defense
April 05, 2024
Threat Intelligence - Knowledge is power & security
>>>

NIS2
April 05, 2024
NIS2 & ISO/IEC 27001:2022: New controls to fulfill both standards
>>>

Identity & Access Management
April 05, 2024
How Privileged Access Management increases security
>>>

Assessment & Advisory
April 05, 2024
vCISO - more IT Security through customizable support
>>>

AI
Cloud Platform Security
April 03, 2024
AI from Microsoft: Is your company Copilot Ready?
>>>

NIS2
April 02, 2024
NIS2 & Risk Management: Are cyber risks really manageable?
>>>

Zero Trust
April 02, 2024
Zero Trust - more IT Security through less trust
>>>

Cloud Platform Security
March 28, 2024
Protective shield for your cloud platforms: Tips, Tricks, Pitfalls
>>>

Assessment & Advisory
March 28, 2024
Security all-rounder CISO: Outsource or hire yourself?
>>>
25% completed

Get in touch now
Contact us for customized security strategies.



You are currently viewing a placeholder content from HubSpot. To access the
actual content, click the button below. Please note that doing so will share
data with third-party providers.

Unblock content Accept required service and unblock content
More Information

About us

In a complex, uncertain and risky world, we offer simplicity, consistency,
excellent services and solutions. We are your responsible partner. You are our
focus. You can rely on us.

Company
 * About us
 * Career
 * Partner
 * Offices
 * Contact

Mediacenter
 * Blog
 * Events & Webinars
 * News
 * Resources
 * Software Download

Legal
 * Data privacy
 * Imprint
 * Compliance

Our alliance partners

Newsletter

You are currently viewing a placeholder content from HubSpot. To access the
actual content, click the button below. Please note that doing so will share
data with third-party providers.

Unblock content Accept required service and unblock content
More Information
 * Global (english)
   * Germany (german)
   * Switzerland (german)

Copyright © 2024 SITS Group
Data protection preference

We need your consent before you can continue to visit our website.If you are
under the age of 16 and wish to give your consent to optional services, you must
ask your parent or guardian for permission. We use cookies and other
technologies on our website. Some of them are essential, while others help us to
improve this website and your experience. Personal data may be processed (e.g.
IP addresses), e.g. for personalized ads and content or the measurement of ads
and content. You can find more information about the use of your data in our
privacy policy. There is no obligation to consent to the processing of your data
in order to use this offer. You can revoke or adjust your selection at any time
under Settings. Please note that not all functions of the website may be
available due to individual settings. Some services process personal data in the
USA. By consenting to the use of these services, you also consent to the
processing of your data in the USA in accordance with Art. 49 (1) lit. a GDPR.
The ECJ classifies the USA as a country with inadequate data protection
according to EU standards. For example, there is a risk that US authorities may
process personal data in surveillance programs without Europeans having the
right to take legal action.

 * Essential
   
   Essential services enable basic functions and are necessary for the proper
   functioning of the website.

 * Marketing
   
   Marketing services are used by third-party providers or publishers to display
   personalized advertising. They do this by tracking visitors across websites.

 * External media
   
   Content from video platforms and social media platforms is blocked by
   default. If external services are accepted, manual consent is no longer
   required to access this content.

Accept all
Save consent
Accept essential cookies
Individual preferences
PreferencesPrivacy policyImprint