{"id":2134,"date":"2022-03-09T18:04:00","date_gmt":"2022-03-09T17:04:00","guid":{"rendered":"https:\/\/kalweit-its.de\/services\/"},"modified":"2024-07-16T18:28:05","modified_gmt":"2024-07-16T16:28:05","slug":"services","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/services\/","title":{"rendered":"Services"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2024\/02\/AdobeStock_311383755.jpg” title_text=”AdobeStock_311383755″ _builder_version=”4.24.0″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.3″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Services<\/h1>\n

Independent IT security from a single source.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.3″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n

Offensive IT audit<\/h3>\n

The supreme discipline<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]<\/p>\n

The supreme discipline of IT security: we find real vulnerabilities in your IT systems before real attackers can exploit them. We do this by acting like potential attackers.<\/p>\n

As one of the market-leading consulting boutiques specializing in manual penetration testing, we are also really good at it.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.3″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Penetration test<\/span><\/a><\/strong>
Red Teaming<\/a>
Phishing test<\/a>
OSINT\/Darknet research<\/a>
Security Check for SMEs<\/a><\/a>
Automotive Cybersecurity<\/a>
Digital Forensics<\/a><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n

Consulting<\/h3>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]<\/p>\n

As part of our consulting services, we eliminate technical weaknesses, develop IT security strategies and concepts and support your IT department in specific areas where help is needed. We are independent and highly specialized IT security consultants.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”]IT Security Consulting<\/a>
\n
DevSecOps<\/a>
\n
DORA<\/a>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n

Cyber Resilience<\/h3>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]<\/p>\n

Do you need an external IT security officer, would you like to simulate a real IT security incident and check how well prepared you are as an organization, or do you urgently need support because your company is threatened by a successful hacker attack? We are here for you.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.25.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Incident Response Service<\/a>
Cyber Incident Simulation<\/a>
Virtual CISO<\/a><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n

Seminars & Lectures<\/h3>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]<\/p>\n

As genuine ethical hackers, we provide authentic first-hand reports on current attack trends and talk from the horse’s mouth – making real awareness-raising entertaining and exciting.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Web Security Workshop for Developers<\/a>
Lectures<\/a>
Security Awareness<\/a><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4IiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@” button_text=”Arrange a non-binding initial meeting now” button_alignment=”center” module_class=”button-secondary” _builder_version=”4.24.0″ _dynamic_attributes=”button_url” _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Services Independent IT security from a single source.Offensive IT audit The supreme disciplineThe supreme discipline of IT security: we find real vulnerabilities in your IT systems before real attackers can exploit them. We do this by acting like potential attackers. As one of the market-leading consulting boutiques specializing in manual penetration testing, we are also […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2134","page","type-page","status-publish","hentry"],"yoast_head":"\nServices - KALWEIT ITS GmbH<\/title>\n<meta name=\"description\" content=\"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalweit-its.de\/en\/services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services - KALWEIT ITS GmbH\" \/>\n<meta property=\"og:description\" content=\"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalweit-its.de\/en\/services\/\" \/>\n<meta property=\"og:site_name\" content=\"KALWEIT ITS GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-16T16:28:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/591.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalweit-its.de\/en\/services\/\",\"url\":\"https:\/\/kalweit-its.de\/en\/services\/\",\"name\":\"Services - KALWEIT ITS GmbH\",\"isPartOf\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#website\"},\"datePublished\":\"2022-03-09T17:04:00+00:00\",\"dateModified\":\"2024-07-16T16:28:05+00:00\",\"description\":\"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.\",\"breadcrumb\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalweit-its.de\/en\/services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kalweit-its.de\/en\/services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/kalweit-its.de\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#website\",\"url\":\"https:\/\/kalweit-its.de\/en\/\",\"name\":\"KALWEIT ITS GmbH\",\"description\":\"Unabh\u00e4ngige Unternehmensberatung f\u00fcr IT-Sicherheit\",\"publisher\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalweit-its.de\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#organization\",\"name\":\"KALWEIT ITS GmbH\",\"url\":\"https:\/\/kalweit-its.de\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg\",\"contentUrl\":\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg\",\"width\":701,\"height\":81,\"caption\":\"KALWEIT ITS GmbH\"},\"image\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/kalweit-its\/\",\"https:\/\/www.instagram.com\/kalweit.its\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Services - KALWEIT ITS GmbH","description":"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalweit-its.de\/en\/services\/","og_locale":"en_US","og_type":"article","og_title":"Services - KALWEIT ITS GmbH","og_description":"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.","og_url":"https:\/\/kalweit-its.de\/en\/services\/","og_site_name":"KALWEIT ITS GmbH","article_modified_time":"2024-07-16T16:28:05+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/591.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kalweit-its.de\/en\/services\/","url":"https:\/\/kalweit-its.de\/en\/services\/","name":"Services - KALWEIT ITS GmbH","isPartOf":{"@id":"https:\/\/kalweit-its.de\/en\/#website"},"datePublished":"2022-03-09T17:04:00+00:00","dateModified":"2024-07-16T16:28:05+00:00","description":"Find out everything about our services and how we can support you and your company. Penetration Testing - Consulting - Cyber Resilience.","breadcrumb":{"@id":"https:\/\/kalweit-its.de\/en\/services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalweit-its.de\/en\/services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kalweit-its.de\/en\/services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/kalweit-its.de\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Services"}]},{"@type":"WebSite","@id":"https:\/\/kalweit-its.de\/en\/#website","url":"https:\/\/kalweit-its.de\/en\/","name":"KALWEIT ITS GmbH","description":"Unabh\u00e4ngige Unternehmensberatung f\u00fcr IT-Sicherheit","publisher":{"@id":"https:\/\/kalweit-its.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalweit-its.de\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalweit-its.de\/en\/#organization","name":"KALWEIT ITS GmbH","url":"https:\/\/kalweit-its.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg","contentUrl":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg","width":701,"height":81,"caption":"KALWEIT ITS GmbH"},"image":{"@id":"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/kalweit-its\/","https:\/\/www.instagram.com\/kalweit.its\/"]}]}},"_links":{"self":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2134"}],"collection":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/comments?post=2134"}],"version-history":[{"count":45,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2134\/revisions"}],"predecessor-version":[{"id":7222,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2134\/revisions\/7222"}],"wp:attachment":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/media?parent=2134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}