• Our services

    After more than a decade of IT consulting experience, we have developed a very special consulting style to solve our customers' problems in the best possible way. In addition to open-minded thinking and the involvement of unconventional solutions, this includes the consistent rejection of classic IT-skill-matrices.

    Over the years we have developed our own system to uniquely identify, promote and motivate IT all-rounders through varied tasks in various fields.

    If you have a problem that your classic IT partners cannot solve, do not hesitate to contact us.

    Our competences

    • Solid skill base (C / C ++) of each employee
    • additionally individual experiences from various areas like e.g. machine vision, machine learning, bioinformatics, big data, packet-based network manipulation.
    • Experience with highly critical data as well as infrastructures in the financial sector
    • API-level experience under Win32, Unix (Linux, AIX, Solaris, OSX) as well as iOS, Android and Blackberry
    • Planning and implementation of IT projects

    Your advantages

    • Solution-oriented way of working
    • No Junior/Senior-consultant
    • Situational programming as part of the consulting
    • Fast familiarization with new (programming) environments is a normal part of our performance
    • Many years of experience dealing with large corporations
  • Security Information & Event Management (SIEM)

    The areas Security Information & Event Management (SIEM) and Identity and Access Management (IAM) are core areas of a security-conscious IT infrastructure. Unfortunately, there is often a high cost pressure in IT security and the need to find presentable solutions.

    Due to our many years of experience in these areas, we are able to offer you a customized, secure and solid solution without the often common abbreviations. Installations managed by us scale very well and process data from several 100,000 components.

    The SIEM installations managed by us use Splunk Enterprise, HP ArcSight ESM, and the ELK stack.

  • Identity and Access Management (IAM)

    As an RSA SecurWorld partner, we support RSA IAM solutions and help through customized extensions to implement the requirements of our customers stable and secure.

    Additionally we are experienced in the operation and expansion of RADIUS servers from different manufacturers in the enterprise domain

    Partner-Logo RSA