Network

As Network Consulting Experts we deliver individual and custom-fit solutions for complex network infrastructures, national and international. Customers profit from our know how of our experienced consultants in the following areas:

  • Management Consulting
  • Project Management
  • Service Management
  • Change Management
  • Definition of System Specification
  • Consulting for RfPs (Request for Proposal)
  • Provider Management
  • Definition and Monitoring of Service Level Agreements (SLA)
  • Initiate, Document and Implement Changes
  • 2nd and 3rd Level Support for errors and error fixing
  • Error analysis and error fixing in the network
  • Cross systems services
  • Support with inspections of systems

 

Our services are not restricted to a specific product but delivered across all technologies. We always consider dependencies and interfaces within the customer’s network.  Examples for this are:

Data Center Management
  • Management Consulting
  • Project Management
  • Service Management
  • Change Management
  • Definition of System Specification
  • Consulting for RfPs (Request for Proposal)
  • Provider Management
  • Definition and Monitoring of Service Level Agreements (SLA)
  • Initiate, Document and Implement Changes
  • 2nd und 3rd Level Support for errors and error fixing
  • Error analysis and error fixing in the network
  • Cross systems services
  • Cost efficient and economical processes
  • Support with inspections of systems
WAN Solutions
  • Architecture and Design in the WAN environment (ISIS, BGP, MPLS)
  • Evaluation of adequate platforms (P, PE, WAN Aggregation)
  • Quality of Service concept
  • WAN Acceleration (Riverbed, Juniper, CISCO WAAS)
  • Software Defined Network (SDN)
  • Software Defined WAN (SDWAN)
  • Cloud Solutions
LAN/MAN Solutions
  • Architecture and Design in the LAN/MAN environment (Office / Campus)
  • Routing / Switching
  • WiFi Solutions

Security

As a competent IT Service Provider we transfer custom fitted IT security solutions according to our customers requirements. Our experts for the initiation and maintenance of IT processes and IT infrastructures  with high security demands stand by your side as competent partners for IT security and IT operations- regardless whether you run the systems yourself  or utilize operating and hosting solutions or services from a cloud. We help you define Information Security Strategies, implement Risk and Disaster Management and train employees in their handling of Information Security requirements. We check your systems regarding the most recent technical security tests and estimate the security level.

Our Services
  • Vulnerability & Risk Management
  • ISMS according to BSI Grundschutz and ISO/IEC 27001
  • Compliance and DSGVO/GDPR
  • Risk- and Business Continuity Management (BCM)
  • Security Solutions for Data Centers (IDS und IPS)
  • Penetration Tests
  • Forensics
  • Awareness Workshops
Vulnerability & Risk Management
  • Implement and train complete processes, integrate in existing structures
  • Staffing of VRM-Team according to need
  • Migration of results from existing analysis of conducted scans (e.g. Qualys)
  • Integrate external information
  • Define comprehensive rule framework to describe IT landscape (Subnets, Environments, etc.)
  • Implement rule based assignment logic for employees
  • Track implementation of vulnerability fixes
  • Report implementation progress and create security status report
  • Complete analysis and visual design of the global infrastructure
  • Create self learning rule set for the design of an efficient workflow
  • Service can be taken over completely tool based by existing antas team
Vulnerability & Risk Management Service (toolbasiert)
  • Improve efficiency via
    • Higher flexibility
    • Reduce handling time by reducing throughput time
    • Reduce costs by reducing ressources
    • Reduce error rate by higher automation level
  • Realtime reporting
  • Live tracking of every processing step
  • Optimize communication by better structures and automation
  • Freely configurable reporting per employee/ team
  • Faster and simpified assignment via more exhaustive and self learning rule set
ISMS according to BSI Grundschutz and ISO/IEC 27001

The security requirements for enterprises continue to grow. Certifications to prove security standards and compliance with specific processes are becoming more important. We offer support regarding building an Information Security Management System (ISMS) and help to obtain the ISO/IEC27001 certificate.

Compliance and GDPR

The EU GDPR is applicable in all member states of the European Union since May 2018 and partly replaces national data protection regulations. That offers risks and rewards at the same time.

Liability for companies that violate or don’t follow the new data regulations has gone up considerably. If a company estimates data protection risks correctly and initiates the right measures, it avoids work and cost intensive restructuring of the IT landscape and reduces the risk of hefty fines and realises data protection compliance at the same time.

We help you establish an up to date and modern data management system. This includes, amongst others, an analysis of the data processing procedures of your company by taking into consideration GDPR requirements.

Risk- and Business Continuity Management (BCM)

To continue operation in case of a crisis is more important for companies today than ever before. Business Continuity Management (BCM) is of utmost importance and should be established, tested and production ready for business critical areas at least. BCM puts you in a position to act quickly and appropiately in a crisis. We consult and support you in building and running an individually designed BCM plan.

Security Solutions for Data Centers (IDS and IPS)

Firewalls and virus scanners are not sufficient for the security of a company network anymore. IDS or IPS are modern day standards. Intrusion-Detection-Systems (IDS) and Intrusion-Prevention-Systems (IPS) make sure that attackers won’t intrude the internal network. Together with the customer we analyse the existing company network and implement the right IDS and/or IPS.

Penetration Tests

Would you like to know how secure your IT-Systems and applications are? Could a hacker intrude into your network? With Penetration tests we are collecting information, utilize professional tools and techniques and find creative solutions to circumvent your protection measures. We play the role of the attacker, penetrate your network and identify weaknesses. Afterwards we help you to get rid of those weaknesses for a long term solution to your protection issues.

Awareness Workshops

If a company has been attacked traces will be left- you have to be able to detect them to prevent a repetition of events. Our forensics experts scrutinize these traces with comprehensive expert knowledge and long experience und unmask the attackers‘ method of operation. As a result, you receive a great deal of information to help you optimize your protection measures.

Forensik

Employees‘ lack of education very often is a reason for non working Information Security measures. The more you motivate and support your employees in understanding the reasons for Infromation Security the easier it gets to establish a really safe organisation. We are hacking us live into your network, demonstrate the dangers of phishing mails and how to protect yourself from these dangers. Our trainings sessions are held interactively. That way we achieve a high level of interest and acceptance to implement what was taught in the training sessions.