{"id":2213,"date":"2022-03-23T18:35:21","date_gmt":"2022-03-23T17:35:21","guid":{"rendered":"https:\/\/kalweit-its.de\/consulting-approach\/"},"modified":"2024-09-10T22:55:55","modified_gmt":"2024-09-10T20:55:55","slug":"consulting-approach","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/consulting-approach\/","title":{"rendered":"Consulting approach"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/mountain1.jpg” title_text=”mountain1″ _builder_version=”4.16″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Our consulting approach<\/strong><\/span><\/h2>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” custom_margin=”-90px|-200px|||false|false” custom_margin_tablet=”0px|0px|||false|false” custom_margin_phone=”0px|0px|||false|false” custom_margin_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n

IT security is a bit like climbing a mountain. Steady, laborious, but also always liberating.<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

After all, if IT security is effectively deployed where actual IT risks occur as part of regular IT operations, IT security creates more freedom. Similar to flight operations: Tried and tested safety concepts and measures make flying possible for everyone.<\/p>\n

As an independent management consultancy, we make your company safe from cyber attacks. We protect them from total failure of your business, data loss, extortion, reputation damage. We pentest, advise and tinker with passion to ensure that your IT solutions, products and business operations remain sustainably secure.<\/p>\n

KALWEIT ITS – a breath of fresh air for your IT security.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Rectangle-25.jpg” title_text=”Rectangle 25″ module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding_phone=”30px||0px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Our way of working<\/h3>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

“We bring a breath of fresh air to your company’s IT security.”<\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_orientation=”right” custom_margin=”40px|-90px|||false|false” custom_margin_tablet=”0px|0px|||false|false” custom_margin_phone=”0px|0px|||false|false” custom_margin_last_edited=”on|desktop” text_orientation_tablet=”left” text_orientation_phone=”left” text_orientation_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n

Independent<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

We make recommendations for action not on the basis of partnerships, but on the basis of your need for protection, the existing conditions of your infrastructure, and other objectively measurable criteria. The recommendations and requirements of the German Federal Office for Information Security (BSI) and regulatory frameworks such as BSI IT-Grundschutz, COBIT, MaRisk, ITIL, ISO27001 or Vds10000 represent elementary pillars.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-24.jpg” title_text=”image (24)” module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”3_5,2_5″ module_class=”ff-t-col-custom-order” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”3_5″ module_class=”ff-t-col-order-2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-23.jpg” title_text=”image (23)” module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_5″ module_class=”ff-t-col-order-1″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” custom_margin=”40px|||-90px|false|false” custom_margin_tablet=”0px|||0px|false|false” custom_margin_phone=”0px|0px|||false|false” custom_margin_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n

Interdisciplinary<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Our experienced IT security consultants have sound and in-depth specializations in IT security as well as various secondary qualifications, for example in the areas of data protection, medicine, forensics or business administration. Through interdisciplinary consulting, we increase the effectiveness, efficiency and pragmatism of security concepts – because any concept is only as effective as it is accepted by those around it.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_orientation=”right” custom_margin=”40px|-90px|||false|false” custom_margin_tablet=”0px|0px|||false|false” custom_margin_phone=”0px|0px|||false|false” custom_margin_last_edited=”on|desktop” text_orientation_tablet=”left” text_orientation_phone=”left” text_orientation_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n

Sustainable<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Through the cooperation of pentesters and consultants, we can comprehensively illuminate the status quo and, based on this, ensure sustainable and long-term security. This is because penetration testing identifies problem areas and recommendations for action, but does not address the deep cause of the problem areas in a sustainable way.<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-20.jpg” title_text=”image (20)” module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” module_alignment=”center” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4In19@” button_text=”Contact” button_alignment=”right” button_alignment_tablet=”center” button_alignment_phone=”center” button_alignment_last_edited=”on|tablet” _builder_version=”4.16″ _dynamic_attributes=”button_url” _module_preset=”a224f92a-b498-4723-ae8f-50fe55cdb9e7″ global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE5In19@” button_text=”About us” button_alignment_tablet=”center” button_alignment_phone=”center” button_alignment_last_edited=”on|tablet” _builder_version=”4.16″ _dynamic_attributes=”button_url” _module_preset=”a224f92a-b498-4723-ae8f-50fe55cdb9e7″ global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Our consulting approachIT security is a bit like climbing a mountain. Steady, laborious, but also always liberating.After all, if IT security is effectively deployed where actual IT risks occur as part of regular IT operations, IT security creates more freedom. Similar to flight operations: Tried and tested safety concepts and measures make flying possible for […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2213","page","type-page","status-publish","hentry"],"yoast_head":"\nConsulting approach - KALWEIT ITS GmbH<\/title>\n<meta name=\"description\" content=\"KALWEIT ITS - our consulting approach\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalweit-its.de\/en\/consulting-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consulting approach\" \/>\n<meta property=\"og:description\" content=\"KALWEIT ITS - our consulting approach\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalweit-its.de\/en\/consulting-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"KALWEIT ITS GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-10T20:55:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/591.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalweit-its.de\/en\/consulting-approach\/\",\"url\":\"https:\/\/kalweit-its.de\/en\/consulting-approach\/\",\"name\":\"Consulting approach - KALWEIT ITS GmbH\",\"isPartOf\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#website\"},\"datePublished\":\"2022-03-23T17:35:21+00:00\",\"dateModified\":\"2024-09-10T20:55:55+00:00\",\"description\":\"KALWEIT ITS - our consulting approach\",\"breadcrumb\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/consulting-approach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalweit-its.de\/en\/consulting-approach\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kalweit-its.de\/en\/consulting-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/kalweit-its.de\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consulting approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#website\",\"url\":\"https:\/\/kalweit-its.de\/en\/\",\"name\":\"KALWEIT ITS GmbH\",\"description\":\"Unabh\u00e4ngige Unternehmensberatung f\u00fcr IT-Sicherheit\",\"publisher\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalweit-its.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#organization\",\"name\":\"KALWEIT ITS GmbH\",\"url\":\"https:\/\/kalweit-its.de\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg\",\"contentUrl\":\"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg\",\"width\":701,\"height\":81,\"caption\":\"KALWEIT ITS GmbH\"},\"image\":{\"@id\":\"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/kalweit-its\/\",\"https:\/\/www.instagram.com\/kalweit.its\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Consulting approach - KALWEIT ITS GmbH","description":"KALWEIT ITS - our consulting approach","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalweit-its.de\/en\/consulting-approach\/","og_locale":"en_US","og_type":"article","og_title":"Consulting approach","og_description":"KALWEIT ITS - our consulting approach","og_url":"https:\/\/kalweit-its.de\/en\/consulting-approach\/","og_site_name":"KALWEIT ITS GmbH","article_modified_time":"2024-09-10T20:55:55+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/591.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kalweit-its.de\/en\/consulting-approach\/","url":"https:\/\/kalweit-its.de\/en\/consulting-approach\/","name":"Consulting approach - KALWEIT ITS GmbH","isPartOf":{"@id":"https:\/\/kalweit-its.de\/en\/#website"},"datePublished":"2022-03-23T17:35:21+00:00","dateModified":"2024-09-10T20:55:55+00:00","description":"KALWEIT ITS - our consulting approach","breadcrumb":{"@id":"https:\/\/kalweit-its.de\/en\/consulting-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalweit-its.de\/en\/consulting-approach\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kalweit-its.de\/en\/consulting-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/kalweit-its.de\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Consulting approach"}]},{"@type":"WebSite","@id":"https:\/\/kalweit-its.de\/en\/#website","url":"https:\/\/kalweit-its.de\/en\/","name":"KALWEIT ITS GmbH","description":"Unabh\u00e4ngige Unternehmensberatung f\u00fcr IT-Sicherheit","publisher":{"@id":"https:\/\/kalweit-its.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalweit-its.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalweit-its.de\/en\/#organization","name":"KALWEIT ITS GmbH","url":"https:\/\/kalweit-its.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg","contentUrl":"https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Kalweit-ITS-Logo.svg","width":701,"height":81,"caption":"KALWEIT ITS GmbH"},"image":{"@id":"https:\/\/kalweit-its.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/kalweit-its\/","https:\/\/www.instagram.com\/kalweit.its\/"]}]}},"_links":{"self":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/comments?post=2213"}],"version-history":[{"count":28,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2213\/revisions"}],"predecessor-version":[{"id":7327,"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/pages\/2213\/revisions\/7327"}],"wp:attachment":[{"href":"https:\/\/kalweit-its.de\/en\/wp-json\/wp\/v2\/media?parent=2213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}