Who constructs, does not audit and who audits, does not construct
Practical application of dual control
IT-Transfusion provides services for IT-Security.
The name IT-Transfusion illustrates just like in medical transfusion the process of precise preparation, dosage and monitoring. We strengthen people and systems so customers are able to concentrate on their business - functionality has priority.
We work and think in correlations. We rely on our powerful network of qualified partners, security researchers and scientists for that reason. We think outside the box and consciously employ other scientific methods like f.E educational science or applied psychology.
We are excited to be in direct exchange with many practicioners and researchers. We want to express our gratitudes to the many dedicated people applying their capabilities in order to improve IT-Security.
We provide IT-Security for people and machines, in this particular order.
Respect, understandability and truth in contact with others.
One should treat others as one would like others to treat oneself.
also known as golden rule