Image

Questionnaire and Calculations

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.

Critical applications

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.

Image
fas fa-cogs

I have already

fas fa-cogs

My goal

Level 1 Level 2 Level 3
Identity Management
Multifactor Authenitication using PIV (Smartcard) and/or FIDO2
Self service and/or managed identity provisioning
Zero Trust
Certificate Management System with HSM
Identity Provisioning
Signins and Private Key Infrastructure
Artificial intelligence monitoring of authentication
Access Management
Role-based validation/authorisation
Use of PIV (Smartcard) and/or FIDO2
Single Sign On (SSO)
managed Identity Provision
Token-based API-security
attribute based access management
No additional best practices
Security & Firewalls
External access only over proxy
Access only to needed ports and routes
Malware / ransomware / virus detection
AI - based ransomware detection and antivirus tools
High availability networks with segregation
Monitoring
Analytics and surveilance of hardware und logins
Darkweb monitoring of domain and emails subversive activities (Know your business; KYB)
Triple monitoring
AI-Based anomaly detection
(Network monitor is externally monitored, which is also monitored)
Darkweb monitoring of customer and management subversive activities (Know your customer - KYC; Know your management; KYM)
Zero Trust
Darkweb Monitoring
Darkweb monitoring of employee subversive activities (Know your Employee - KYE)
Communications
Secure Mail
Secure Conference
Secure Chat (intern and Ext.)
Verified users
trusted signature class 2
Channel independent CI/ CD and event-based solutions. Encrpyted and secured datamanagement
AI-monitored interactions
Validated but anonymous secure communication
Zero-Trust with FIDO2 ID-Validations
Transactions
SSL
Tokenbased / zero trust end to end secured transactions
AI-monitored transactions
Data Security
Backup according to 321/322 rule (3 data copies, of which 1 production, 2 different media, 1 offsite or 1 offsite & 1 in cloud)
Encrypted backups
Encryption of data at rest
Mulilayer encryption
AI digital fingerprinting of data
Collaboration
Rolebased access to data and applications.
Zero Trust with IAM and API-Tokens
AI-monitored collaboration
Compliance
DSG adherence
Implemented technical and organisational measures
Compliant data - archiving policies
Whistleblowing functionality
Secure and compliance customer / partner communications
No additional best practices

Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart
Rating
Cost Rating
Single Sign On
Authentication (?Authorisation ABAC/RBAC?)
Federated ID Management
full access monitoring
Rating
Cost Rating
MFA/FIDO Token/ Passwordless/
Single Sign On
Authentication (?Authorisation ABAC/RBAC?)
Signing/Electronic Signature
Rating
Cost Rating
Single Sign On
Federated ID Management
protected storage
Rating
Cost Rating
SSO
Authentication (?Authorisation ABAC/RBAC?)
Rating
Cost Rating
Rating
Cost Rating
secure compliant video conferences/ transcripts
Rating
Cost Rating
SSO
Single Sign On
Signing/Electronic Signature
secure encryption
Fraud, AML, KYC, Risk
Anomaly spotting
Rating
Cost Rating
MFA/FIDO Token/ Passwordless/
Rating
Cost Rating
Authentication Module XYZ macht Anomaly Monitoring
open secure collaboration.
Rating
Cost Rating
Risk Engine,Integrity Scan, Dark Web
Rating
Cost Rating
Access monitoring
secure & compliant sharing
full access monitoring
AI Pattern-based monitoring
Rating
Cost Rating
Rating
Cost Rating
Rating
Cost Rating
Rating
Cost Rating
Rating
Cost Rating
Rating
Cost Rating
Rating
Cost Rating
Rating
Cost Rating
Rating
Cost Rating
Do you wish to be Contacted?
We appreciate your engagement with our Evaluation Tool, designed to provide you with a comprehensive analysis tailored to your unique requirements. Your commitment to excellence is evident, and we want to ensure that your experience is nothing short of exceptional.

By selecting the "Commit and Calculate" button, you initiate a sophisticated process that not only computes precise calculations but also furnishes you with detailed statistics through our cutting-edge Evaluation Tool. This information serves as a strategic compass, guiding your decisions towards optimal outcomes.

Should you contemplate a shift in your product preference for achieving the pinnacle of success at your LEVEL, feel free to revisit and modify your responses. Your commitment to excellence warrants the flexibility to align with your evolving objectives.

In addition to the insightful results, our platform offers you the capability to immortalize your achievements in a tangible format. By selecting the "Create PDF" option, a bespoke document encapsulating your results will be generated. To access this personalized report, you will be provided with a unique token, ensuring the security and exclusivity of your confidential information.

Your journey towards success is not only marked by commitment but also by informed choices. Click, commit, calculate, and elevate your trajectory with our sophisticated Evaluation Tool.