{"id":2437,"date":"2022-03-05T00:29:17","date_gmt":"2022-03-04T23:29:17","guid":{"rendered":"https:\/\/kalweit-its.de\/about-us\/"},"modified":"2024-11-07T17:07:54","modified_gmt":"2024-11-07T16:07:54","slug":"about-us","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/about-us\/","title":{"rendered":"About Us"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row module_class=”ueber-uns-header-row” _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2023\/03\/14.01.2023_KalweitITS_0460-scaled.jpg” title_text=”14.01.2023_KalweitITS_0460″ module_class=”img–cover position-10 ueber-uns-header-image” _builder_version=”4.19.0″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][et_pb_text module_class=”ueber-uns-header-text” _builder_version=”4.24.2″ _module_preset=”default” animation_style=”none” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”8d58e759-e650-4217-8248-3d6426f90cd2″ custom_padding=”||0px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
<\/span><\/p>\n <\/span><\/p>\n “Cyber attacks are the biggest business risk worldwide.”<\/span><\/p>\n Allianz Risk Barometer 2024 [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”32px||32px||true|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n KALWEIT ITS – A breath of fresh air in IT security<\/strong><\/span><\/p>\n As an independent consulting boutique with a focus on manual penetration tests, we bring fresh perspectives to our clients’ IT security. For seven years, DAX companies as well as numerous medium-sized companies have placed their trust in us. High project volumes or short-term implementation are no problem thanks to our exclusively permanent team.<\/span><\/p>\n For our work, we were included in the Forbes 30 under 30 DACH list in 2019 and named “Hamburger of the Month” by DIE ZEIT.<\/span><\/p>\n [\/et_pb_text][et_pb_button button_url=”https:\/\/webforms.pipedrive.com\/f\/6GZGSOOEF7DWNXZ21GJunmMbS1ZvmAdehjCd9MqE6eWXql2arqt40z68FGkivLzJpV” url_new_window=”on” button_text=”Download company presentation as PDF” module_class=”button-cta popmake-8503″ _builder_version=”4.27.2″ _module_preset=”a224f92a-b498-4723-ae8f-50fe55cdb9e7″ hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”CONSULTING APPROACH” image=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2023\/03\/14.01.2023_KalweitITS_0466-scaled.jpg” module_class=”crop-img-4-3″ _builder_version=”4.19.0″ _module_preset=”default” header_level=”h3″ header_font=”|||on|||||” global_colors_info=”{}”]<\/p>\n We minimize cyber risks holistically and risk-oriented according to the Pareto principle. This means minimizing 80% of the risks by 20% of the effort.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Certified” image=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/1Y2A0377-scaled.jpg” module_class=”crop-img-4-3″ _builder_version=”4.27.0″ _module_preset=”default” header_level=”h3″ header_font=”|||on|||||” global_colors_info=”{}”]<\/p>\n Our team consists of permanently employed IT security experts, most of whom have an academic background and recognized certificates. [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”DNA = passion” image=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2023\/03\/14.01.2023_KalweitITS_0493-scaled.jpg” module_class=”crop-img-4-3″ _builder_version=”4.19.0″ _module_preset=”default” header_level=”h3″ header_font=”|||on|||||” global_colors_info=”{}”]<\/p>\n When you turn your hobby into a profession, one thing becomes very clear: passion and lifeblood become the DNA of the company.<\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”8d58e759-e650-4217-8248-3d6426f90cd2″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n We bring a breath of fresh air to your company’s IT security. [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_video src=”https:\/\/youtu.be\/aKtE2vgyCkM” _builder_version=”4.21.0″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_video][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”8d58e759-e650-4217-8248-3d6426f90cd2″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n We take a holistic view of cyber risk mitigation. Because only by uniting technology and people can you sustainably develop new perspectives and securely shape companies.<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”72px||72px||true|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” min_height=”71.8px” custom_margin=”||-22px|||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb _builder_version=”4.16″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n 01<\/span><\/p>\n We think outside the box:<\/span><\/span><\/p>\n Automated systems support us in our work, but to be really sure, we test manually to find every weak point.<\/span><\/span><\/p>\n In addition, our final documents and reports are so detailed that a considerable amount of consulting work is no longer required afterwards. Our documentation work is unique in our industry.<\/span><\/p>\n We also have high professional standards for ourselves: We only employ specialists with many years of pentesting experience and we work exclusively with permanent colleagues.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb _builder_version=”4.16″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n 02<\/span><\/p>\n A breath of fresh air – We believe that IT security has to be different today. Security means trust in independent solutions. Safety is not a product, but a continuous process. This is precisely why we work with holistic consulting methods and understand companies as a holistic security factor – just as an attacker would. Because a concept does not make a system.<\/p>\n Furthermore, as an independent consulting firm, we are free from partnerships to specific technologies and IT products, so our consulting work is unbiased and independent.<\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb _builder_version=”4.16″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n 03<\/span><\/p>\n Because safety is also a social issue. After all, any security concept is only as effective as it is accepted and implemented by the user. We combine a breath of fresh air with decades of expertise from our consultants. An interplay of computer science, social sciences and psychology to design the most suitable solution in tried and tested project teams. In addition, our work is based on recognized standards such as BSI IT-Grundschutz, OWASP Testing Guide, COBIT, ITIL, ISO\/IEC 2700x or NIST.<\/p>\n Our experts also have proven specialized knowledge as well as various additional qualifications in the areas of data protection, criminology, forensics, and business administration and\/or were partially employed in previous professional positions as, for example, a security officer. Police officers active.<\/p>\n [\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb _builder_version=”4.16″ _module_preset=”default” header_level=”h3″ global_colors_info=”{}”]<\/p>\n 04<\/span><\/p>\n A good consultant knows many industries – and even more roads that lead to Rome. <\/p>\n [\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/hamburg@work.png” title_text=”hamburg@work” _builder_version=”4.24.0″ _module_preset=”default” width=”37%” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/Allianz_Teilnehmer.png” title_text=”Allianz_Teilnehmer” _builder_version=”4.24.0″ _module_preset=”default” width=”38%” module_alignment=”right” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":" We protect you against the biggest business risk in the world – cyber attacks.Who we are “Cyber attacks are the biggest business risk worldwide.” Allianz Risk Barometer 2024 KALWEIT ITS – A breath of fresh air in IT security As an independent consulting boutique with a focus on manual penetration tests, we bring fresh perspectives […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2437","page","type-page","status-publish","hentry"],"yoast_head":"\n
<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n
\nWhether medium-sized companies or large corporations – customized solutions are our claim.
\nWe think like real attackers to discover security vulnerabilities that others overlook. <\/span><\/p>\n
\nWith passion and experience, we support IT security departments in protecting their systems against the biggest business risk in Europe: Cyberattacks. <\/span><\/p>\n
\nAs in-depth specialists, they have been focusing exclusively on penetration testing for years.
\nWe deliberately do not use subcontractors in order to guarantee quality, trust and expertise. <\/p>\nOur goal<\/h3>\n
<\/span><\/p>\nHow we work<\/h3>\n
Good reasons for us<\/h3>\n
Highly specialized expert knowledge<\/h4>\n
Sustainable and independent<\/h4>\n
Interdisciplinary<\/h4>\n
Outstanding references<\/h4>\n
\nWe have gained extensive experience in various industries and are very familiar with the specific IT compliance requirements, including DORA, BAIT, VAIT and DiGAV.
\nThanks to this knowledge and our expertise in current best practices, numerous companies trust us.
\nThese include medium-sized companies with 50 to 500 employees, critical infrastructures with up to 400,000 employees and 5 of the 50 largest German banks.
\nOur long-standing customers also include energy suppliers, lotteries, building cooperatives and many more. <\/p>\n