{"id":2134,"date":"2022-03-09T18:04:00","date_gmt":"2022-03-09T17:04:00","guid":{"rendered":"https:\/\/kalweit-its.de\/services\/"},"modified":"2024-11-29T10:40:53","modified_gmt":"2024-11-29T09:40:53","slug":"services","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/services\/","title":{"rendered":"Services"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2024\/02\/AdobeStock_311383755.jpg” alt=”Abstract representation of data streams that run as bright blue lines and dots over a dark background. The lines form vortex-like patterns and symbolize the movement of information in digital space ” title_text=”AdobeStock_311383755″ _builder_version=”4.27.2″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
When it comes to the biggest business risk worldwide, you prefer to rely on specialists rather than generalists.<\/span><\/p>\n Our consulting boutique offers you customized solutions and personal support – in a quality that large technology providers, system houses or the Big 4 are often unable to provide.<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.3″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n The supreme discipline<\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]The supreme discipline of IT security: we find real vulnerabilities in your IT systems before attackers can exploit them. We achieve this by acting like potential attackers. <\/span><\/p>\n As one of the market-leading consulting boutiques specializing in manual penetration testing, we are extremely experienced in this field.<\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.3″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Penetration test<\/span><\/a><\/p>\n Red Teaming penetration test<\/span><\/a> Phishing test<\/a> [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” custom_padding=”||2px|||” global_colors_info=”{}”]As part of our consulting services, we eliminate technical vulnerabilities, develop IT security strategies and concepts and support your IT department in specific areas where support is needed. We are independent and highly specialized IT security consultants. <\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n IT Security Consulting<\/a><\/p>\n DevSecOps<\/a><\/p>\n DORA<\/a><\/p>\n NIS2<\/a><\/a><\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]<\/p>\n Do you need an external IT security officer, would you like to simulate a real IT security incident and check how well prepared you are as an organization, or do you urgently need support because your company is threatened by a successful hacker attack? We are here for you.<\/span><\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Incident Response Service<\/a> [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.24.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]As genuine ethical hackers, we provide authentic first-hand reports on current attack trends and talk from the horse’s mouth – making real awareness-raising entertaining and exciting.<\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.3″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n <\/a>Lectures \/ Keynote<\/span><\/a><\/a><\/p>\n Websecurity workshop for developers<\/a>Offensive IT audit<\/h3>\n
Managed pentest service<\/a><\/span><\/p>\n
OSINT\/Darknet research<\/a>
Security check for SMEs<\/a>
Automotive Cybersecurity<\/a>
Digital forensics<\/a><\/p>\nConsulting<\/h3>\n
Cyber Resilience<\/h3>\n
Cyber Incident Simulation<\/a>
Virtual CISO<\/a><\/p>\nSeminars & Lectures<\/h3>\n
Security Awareness<\/a><\/p>\n