Security Services

We are happy to support you in the management of your inventory, with special attention to your IT infrastructure. We provide support in setting up and managing mobile devices, ensure optimal connectivity between individual in-house workstations, and build a basic structure for your IT together with you. We can also check your current security level with a pentest or an awareness check. We also have solutions for tracking attacks that have already been made on your IT.

Mobile Device Management

Work cell phones, home office laptops, or maybe even tablets and board computers in company cars – mobile devices are one thing above all: practical! But they also have to be well managed! In addition to compliance with the legal framework, IT security measures and the coordination and management of the devices must also be taken into account. We can contribute to this: We advise on the acquisition, setup and organization of the mobile device inventory. This way, the more complex aspects of mobility are taken care of and you can fully concentrate on your own productivity.

Just ask

Workplace Management

Workplace Management

What equipment do the employees on your team have? Probably a computer. And the keyboard and mouse to go with it. A monitor, maybe even two monitors. And what comes with it? A telephone? A headset to go with it? A webcam? A docking station? And then the associated cabling… That can add up to a lot. But with the help of MORGENSTERN this is no problem. We help you plan, implement and set up your workstations so you don’t have to worry about it anymore.

Just ask

Infrastructure Management

Infrastructure Management

Admittedly: A very broad term. What does it mean? The backbone of any team that uses IT in its daily work is a functioning IT structure. The exact components of this structure can vary, of course, because not everyone uses their own server, a telephone system, their own cloud, intra- and internet or other relevant products. What is certain, however, is that the products used must work well together. Otherwise a long chain of problems can arise and that is something everyone wants to avoid. We support you in the design, implementation and management of your infrastructure – because it’s important!

Jetzt anfragen

Pentest

Pentest

Digital attacks by cyber criminals can not only fundamentally endanger stored data, but also the operational capacity of companies and institutions. To counter this danger, MORGENSTERN supports you in generating a comprehensive status quo.

Using state-of-the-art methods, we carry out a fictitious cyber attack on your network and document it extensively. Because only if you know which potential risks could be dangerous for you, it is also possible for you to initiate the right measures.

Just ask

Awareness Check

Awareness Check

The greatest danger for IT systems are their users. You can’t program them – you can only train them. In an awareness check we check how aware your team is of the types of attacks on IT systems. We try to get information from your employees with different strategies, with which a cyber criminal could cause real damage. This gives you insights into what is going on in your team and also provides you with a basis for training your team on the topic of awareness and its relevance.

Jetzt anfragen

IT Forensics

IT Forensics

Better late than never! Even if an attack on your IT has already been carried out – whether successful or not – there are helpful measures. With the latest possibilities, attacks can be traced back and reconstructed, allowing security gaps to be identified. The knowledge of these gaps is of course essential for the defense against subsequent attacks and attacks. Our IT forensics goes hand in hand with comprehensive analysis, evaluation and recommendations for action. Because an attack is a warning signal that you should listen to!

Just ask