We support you during the implementation of your business strategy. From the actual state towards your goal. Based on your requirements, vision and IT framework.
Tactical manoeuvers together with IT operations and IT strategy form the IT management. Our service portfolio ranges from the adoption of KPI-supported reporting to disaster recovery processes.
Advanced Persistent Threats (APTs) are complex, industrialized projects with sponsors, a project team, a budget, a schedule, and a plan. So information security is not an accident. It is also a complex project with sponsors, a project team, a budget, a schedule, and a plan.
Excellence in execution
Information Security Management
Enterprise Open Systems (EOS) is a highly specialized IT consulting manufactory with a competence focus on information security management.
In this sensitive context, we make important contributions to our partners in shaping their IT strategy and tactics to achieve the set security goals with certainty.
We work across industries, but have excellent experience in financial services, insurance, pharmaceuticals, chemicals and cloud providers.
Our employees have decades of expertise in the various aspects of IT security and are recognized specialists with various certifications.
Value Added for your Business
Enterprise Open Systems supports customers through KnowHow, Experience and Passion.
Protection Goals: CIA and CIAA Management Summary The traditional protection goals of information security are confidentiality, integrity and availability. These three protection goals are often referred to as the CIA triad (owing to the initial letter of the respective goals).Meanwhile, another protection goal has gained in importance. First mentioned by the BSI as a sub-area[…]
Supervisory Requirements for IT in Insurance Companies (VAIT) Management Summary The Federal Financial Supervisory Authority (BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht)) has formulated clear expectations for the management and organisation of the IT of insurance companies in the form of the Supervisory Requirements for IT in Insurance Companies (VAIT (Versicherungsaufsichtliche Anforderungen an die IT )). On the[…]
IT budget for Cloud Computing Anyone wishing to expand their IT infrastructure with cloud resources – be it in the form of a private, public or hybrid cloud – quickly realizes that this shift requires a re-orientation of the IT budget – especially the evaluation of cloud computing. Cloud services cost accounting follows different rules[…]
10 Points Plan against Ransomware You have heard about Cryptolocker Infection over the news? In this article you can learn more about this type of malware and receive tips and suggestions on how to protect your company against Ransomware. Reading time 5 minutes. What is Ransomware? Over the past few years, we have witnessed the[…]
In an increasingly interconnected world where societies depend on digital infrastructure, cyber security is becoming increasingly relevant. The fact that data breaches are becoming increasingly frequent and hacker attacks on power suppliers are successful shows the impact that insufficient cybersecurity can cause. In this glossary you will find a condensed overview of the most important[…]
Author: Carsten ReffgenThe introduction of new technologies is always a challenge as much as a risk for IT executives. With cloud computing there are additional issues as cloud computing changes processes and the collaboration with other departments. In the following, we provide an overview and suggestions as to which subjects fall in your responsibility as[…]