|
Antiviren-Lösungen und Malware-Erkennung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Firewalls
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
E-Mail-Security und Spamfilter
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Datensicherungs-, Backup- und Wiederherstellungs-Lösungen (Disaster Recovery/Business Continuity)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Redundante Datenspeicherung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Redundante Hardware/Systeme
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lösungen zur Datenverschlüsselung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lösungen zur E-Mail-Verschlüsselung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lösungen zur sicheren Datenträgerlöschung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lösungen zur VoIP-Verschlüsselung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
VPN-Verschlüsselung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Sichere Kollaborationslösung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Webbasierte/Virtuelle Datenräume
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Nutzerprofile und Nutzer-/Gruppenrichtlinien
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Verzeichnisdienste und Identitätsmanagement (IdM)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Client- und Systemmanagement
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Update- und Patchmanagement, zentrale Softwareverwaltung
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Systemmonitoring, Logging und Reporting
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Data Loss Prevention (DLP)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Security Information and Event Management (SIEM), Advanced Cyber Defense
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Threat Monitoring, Unified Threat Management (UTM), Threat Analytics
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Intrusion Detection & Prevention (IDS/IPS)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
(Distributed) Denial of Service Prevention (DoS/DDoS) / Abwehr von koordinierten Angriffen
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Automatisierte Schwachstellen-Scans (Vulnerability-, Port-Scans)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Forensische Tools und Log-file-Analysen
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Sourcecode-Reviews, statische Code-Analysen, dynamische Code-Analysen, Penetration-Testing und Laufzeit-Profiling
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Ausrichtung des Software-Entwicklungsprozesses auf IT- und Informationssicherheit (Security by Design, Privacy by Design)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|