{"id":2134,"date":"2022-03-09T18:04:00","date_gmt":"2022-03-09T17:04:00","guid":{"rendered":"https:\/\/kalweit-its.de\/services\/"},"modified":"2024-11-29T10:40:53","modified_gmt":"2024-11-29T09:40:53","slug":"services","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/services\/","title":{"rendered":"Services"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2024\/02\/AdobeStock_311383755.jpg” alt=”Abstract representation of data streams that run as bright blue lines and dots over a dark background. The lines form vortex-like patterns and symbolize the movement of information in digital space ” title_text=”AdobeStock_311383755″ _builder_version=”4.27.2″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Services<\/h1>\n

When it comes to the biggest business risk worldwide, you prefer to rely on specialists rather than generalists.<\/span><\/p>\n

Our consulting boutique offers you customized solutions and personal support – in a quality that large technology providers, system houses or the Big 4 are often unable to provide.<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.3″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n

Offensive IT audit<\/h3>\n

The supreme discipline<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]The supreme discipline of IT security: we find real vulnerabilities in your IT systems before attackers can exploit them. We achieve this by acting like potential attackers. <\/span><\/p>\n

As one of the market-leading consulting boutiques specializing in manual penetration testing, we are extremely experienced in this field.<\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.3″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Penetration test<\/span><\/a><\/p>\n

Red Teaming penetration test<\/span><\/a>
Managed pentest service<\/a><\/span><\/p>\n

Phishing test<\/a>
OSINT\/Darknet research<\/a>
Security check for SMEs<\/a>
Automotive Cybersecurity<\/a>
Digital forensics<\/a><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n

Consulting<\/h3>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” custom_padding=”||2px|||” global_colors_info=”{}”]As part of our consulting services, we eliminate technical vulnerabilities, develop IT security strategies and concepts and support your IT department in specific areas where support is needed. We are independent and highly specialized IT security consultants. <\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

IT Security Consulting<\/a><\/p>\n

DevSecOps<\/a><\/p>\n

DORA<\/a><\/p>\n

NIS2<\/a><\/a><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n

Cyber Resilience<\/h3>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]<\/p>\n

Do you need an external IT security officer, would you like to simulate a real IT security incident and check how well prepared you are as an organization, or do you urgently need support because your company is threatened by a successful hacker attack? We are here for you.<\/span><\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Incident Response Service<\/a>
Cyber Incident Simulation<\/a>
Virtual CISO<\/a><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n

Seminars & Lectures<\/h3>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]As genuine ethical hackers, we provide authentic first-hand reports on current attack trends and talk from the horse’s mouth – making real awareness-raising entertaining and exciting.<\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.3″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

<\/a>Lectures \/ Keynote<\/span><\/a><\/a><\/p>\n

Websecurity workshop for developers<\/a>
Security Awareness<\/a><\/p>\n

Secure Coding Workshop<\/a><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4In19@” button_text=”Arrange a non-binding initial meeting now” button_alignment=”center” module_class=”button-secondary” _builder_version=”4.24.0″ _dynamic_attributes=”button_url” _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Services When it comes to the biggest business risk worldwide, you prefer to rely on specialists rather than generalists. Our consulting boutique offers you customized solutions and personal support – in a quality that large technology providers, system houses or the Big 4 are often unable to provide.Offensive IT audit The supreme disciplineThe supreme discipline […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2134","page","type-page","status-publish","hentry"],"yoast_head":"\nServices - KALWEIT ITS GmbH<\/title>\n<meta name=\"description\" content=\"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalweit-its.de\/en\/services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services\" \/>\n<meta property=\"og:description\" content=\"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalweit-its.de\/en\/services\/\" \/>\n<meta property=\"og:site_name\" content=\"KALWEIT ITS GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-29T09:40:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/591.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalweit-its.de\/en\/services\/\",\"url\":\"https:\/\/kalweit-its.de\/en\/services\/\",\"name\":\"Services - KALWEIT ITS GmbH\",\"isPartOf\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#website\"},\"datePublished\":\"2022-03-09T17:04:00+00:00\",\"dateModified\":\"2024-11-29T09:40:53+00:00\",\"description\":\"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.\",\"breadcrumb\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalweit-its.de\/en\/services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kalweit-its.de\/en\/services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/kalweit-its.de\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#website\",\"url\":\"https:\/\/kalweit-its.de\/en\/\",\"name\":\"KALWEIT ITS GmbH\",\"description\":\"Unabh\u00e4ngige Unternehmensberatung f\u00fcr IT-Sicherheit\",\"publisher\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalweit-its.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#organization\",\"name\":\"KALWEIT ITS GmbH\",\"url\":\"https:\/\/kalweit-its.de\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg\",\"contentUrl\":\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg\",\"width\":701,\"height\":81,\"caption\":\"KALWEIT ITS GmbH\"},\"image\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/kalweit-its\/\",\"https:\/\/www.instagram.com\/kalweit.its\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Services - KALWEIT ITS GmbH","description":"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalweit-its.de\/en\/services\/","og_locale":"en_US","og_type":"article","og_title":"Services","og_description":"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.","og_url":"https:\/\/kalweit-its.de\/en\/services\/","og_site_name":"KALWEIT ITS GmbH","article_modified_time":"2024-11-29T09:40:53+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/591.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kalweit-its.de\/en\/services\/","url":"https:\/\/kalweit-its.de\/en\/services\/","name":"Services - KALWEIT ITS GmbH","isPartOf":{"@id":"https:\/\/kalweit-its.de\/en\/#website"},"datePublished":"2022-03-09T17:04:00+00:00","dateModified":"2024-11-29T09:40:53+00:00","description":"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.","breadcrumb":{"@id":"https:\/\/kalweit-its.de\/en\/services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalweit-its.de\/en\/services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kalweit-its.de\/en\/services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/kalweit-its.de\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Services"}]},{"@type":"WebSite","@id":"https:\/\/kalweit-its.de\/en\/#website","url":"https:\/\/kalweit-its.de\/en\/","name":"KALWEIT ITS GmbH","description":"Unabh\u00e4ngige Unternehmensberatung f\u00fcr IT-Sicherheit","publisher":{"@id":"https:\/\/kalweit-its.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalweit-its.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalweit-its.de\/en\/#organization","name":"KALWEIT ITS GmbH","url":"https:\/\/kalweit-its.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg","contentUrl":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg","width":701,"height":81,"caption":"KALWEIT ITS GmbH"},"image":{"@id":"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/kalweit-its\/","https:\/\/www.instagram.com\/kalweit.its\/"]}]}},"_links":{"self":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/comments?post=2134"}],"version-history":[{"count":69,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2134\/revisions"}],"predecessor-version":[{"id":8737,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2134\/revisions\/8737"}],"wp:attachment":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/media?parent=2134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}