Critical infrastructures are organisations and institutions that are crucial to our nation and government. These infrastructures are increasingly reliant on IT-supported systems and require special protection, because malfunction and disruption can have dramatic consequences for the German economy and society. It is therefore vitally important to protect CRITIS from cyber attacks, espionage and sabotage.
secunet’s Critical Infrastructures division is dedicated to the integrators, manufacturers and operators of critical infrastructures. With industry-specific knowledge and methodical, technical expertise, the division implements efficient and effective IT security strategies and tailored information security solutions.
The division specialises in securing the most vulnerable aspects of critical infrastructures while meeting all applicable legal requirements. Its services include IT security consulting, the design of information security management systems, customer-specific software development, penetration tests, certification services and security awareness training. What’s more, the division’s extensive product portfolio allows customers to prevent malfunctions and security breaches and respond appropriately should the worst happen. Adopting a holistic approach to IT security, the division establishes secure, tamper-proof connections between networks, enables secure (mobile) remote access to sensitive IT areas like process control and automation systems, and implements protection systems. This means cyber-attacks are effectively repelled without impairing the availability of critical systems.
For further information see www.secunet.com/en/critis or simply visit our stand.
Other products from
Critical Infrastructures (CRITIS) is assigned to following product groups:
- Application security (121)
- APT protection (61)
- Awareness (95)
- Forensics (76)
- Identity and access management (112)
- Industrial IT security (163)
- Intrusion detection/prevention (81)
- ISMS (ISO-IEC 2700x/BS 7799) (112)
- Localization (8)
- Mobile device management (104)
- Open source (software and services) (54)
- Penetration tests (55)
- Server-based computing (22)
- Data center infrastructures (57)
- Academia/Research (77)