Profile ID: UNT-4333

ConSecur GmbH, security & consulting

ConSecur GmbH
security & consulting

Nödiker Str. 118
49716 Meppen

Phone: +49 5931 92 24-0
Fax: +49 5931 92 24-44
E-mail:
WWW:

Company overview

Manufacture focus, service offers:
technology in order to achieve the security and reliability of the production factor "information" for our customers in the long term.

In coordination with customer requirements, the range of services is continuously adapted to current technological and organizational trends. Initially, the focus was on topics such as virus protection and sealing off networks with firewalls, but over the years the topic of "information security management" based on standards such as ISO27001 or BSI (German Federal Office for Information Security) basic protection has become increasingly important. ConSecur has responded to this with new solutions such as identity management, IT risk management and business continuity management. New technologies and services such as cloud computing (outsourcing IT infrastructure or applications to service providers in globally distributed environments) will continue to pose new challenges for information security.
Technology usage:
SIEM (Security Information Event Management)
ISMS (Information Security Management System)
Training courses
IAM (Identity Access Management)
Know-how:
As a vendor-independent consulting and service company, ConSecur GmbH is concerned with
the planning and implementation of information security measures. Our passion is the development,
evaluation and realization of IT security concepts
for companies. This is how we protect the information
that you need every day for purchasing, production, services,
logistics and correspondence. ConSecur has
specialized in linking information security to the
business processes in the organizational and IT environment. Here we rely
on the existing business processes and technologies
technologies used by our customers. We establish solution-oriented, standardized and efficient measures
efficient measures that enable our customers to
manage their information technology risks
and comply with existing regulatory requirements.
The aim of our work is to only grant authorized persons
access to information and to protect information
from unauthorized access.
Annotations:
supraregional use
Contact and cooperation research:
Banks and insurance companies, telecommunications, automotive, general industry, public clients

Last update on Jan 21, 2025.