{"id":2213,"date":"2022-03-23T18:35:21","date_gmt":"2022-03-23T17:35:21","guid":{"rendered":"https:\/\/kalweit-its.de\/consulting-approach\/"},"modified":"2024-09-10T22:55:55","modified_gmt":"2024-09-10T20:55:55","slug":"consulting-approach","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/consulting-approach\/","title":{"rendered":"Consulting approach"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/mountain1.jpg” title_text=”mountain1″ _builder_version=”4.16″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” custom_margin=”-90px|-200px|||false|false” custom_margin_tablet=”0px|0px|||false|false” custom_margin_phone=”0px|0px|||false|false” custom_margin_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
After all, if IT security is effectively deployed where actual IT risks occur as part of regular IT operations, IT security creates more freedom. Similar to flight operations: Tried and tested safety concepts and measures make flying possible for everyone.<\/p>\n
As an independent management consultancy, we make your company safe from cyber attacks. We protect them from total failure of your business, data loss, extortion, reputation damage. We pentest, advise and tinker with passion to ensure that your IT solutions, products and business operations remain sustainably secure.<\/p>\n
KALWEIT ITS – a breath of fresh air for your IT security.<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Rectangle-25.jpg” title_text=”Rectangle 25″ module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding_phone=”30px||0px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_orientation=”right” custom_margin=”40px|-90px|||false|false” custom_margin_tablet=”0px|0px|||false|false” custom_margin_phone=”0px|0px|||false|false” custom_margin_last_edited=”on|desktop” text_orientation_tablet=”left” text_orientation_phone=”left” text_orientation_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
We make recommendations for action not on the basis of partnerships, but on the basis of your need for protection, the existing conditions of your infrastructure, and other objectively measurable criteria. The recommendations and requirements of the German Federal Office for Information Security (BSI) and regulatory frameworks such as BSI IT-Grundschutz, COBIT, MaRisk, ITIL, ISO27001 or Vds10000 represent elementary pillars.<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-24.jpg” title_text=”image (24)” module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”3_5,2_5″ module_class=”ff-t-col-custom-order” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”3_5″ module_class=”ff-t-col-order-2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-23.jpg” title_text=”image (23)” module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_5″ module_class=”ff-t-col-order-1″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” custom_margin=”40px|||-90px|false|false” custom_margin_tablet=”0px|||0px|false|false” custom_margin_phone=”0px|0px|||false|false” custom_margin_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
Our experienced IT security consultants have sound and in-depth specializations in IT security as well as various secondary qualifications, for example in the areas of data protection, medicine, forensics or business administration. Through interdisciplinary consulting, we increase the effectiveness, efficiency and pragmatism of security concepts – because any concept is only as effective as it is accepted by those around it.<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_orientation=”right” custom_margin=”40px|-90px|||false|false” custom_margin_tablet=”0px|0px|||false|false” custom_margin_phone=”0px|0px|||false|false” custom_margin_last_edited=”on|desktop” text_orientation_tablet=”left” text_orientation_phone=”left” text_orientation_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
Through the cooperation of pentesters and consultants, we can comprehensively illuminate the status quo and, based on this, ensure sustainable and long-term security. This is because penetration testing identifies problem areas and recommendations for action, but does not address the deep cause of the problem areas in a sustainable way.<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-20.jpg” title_text=”image (20)” module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” module_alignment=”center” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4In19@” button_text=”Contact” button_alignment=”right” button_alignment_tablet=”center” button_alignment_phone=”center” button_alignment_last_edited=”on|tablet” _builder_version=”4.16″ _dynamic_attributes=”button_url” _module_preset=”a224f92a-b498-4723-ae8f-50fe55cdb9e7″ global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE5In19@” button_text=”About us” button_alignment_tablet=”center” button_alignment_phone=”center” button_alignment_last_edited=”on|tablet” _builder_version=”4.16″ _dynamic_attributes=”button_url” _module_preset=”a224f92a-b498-4723-ae8f-50fe55cdb9e7″ global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"
Our consulting approachIT security is a bit like climbing a mountain. Steady, laborious, but also always liberating.After all, if IT security is effectively deployed where actual IT risks occur as part of regular IT operations, IT security creates more freedom. Similar to flight operations: Tried and tested safety concepts and measures make flying possible for […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2213","page","type-page","status-publish","hentry"],"yoast_head":"\n