Network security and endpoint security
The harder it is made for cyber attackers, the better. Centralised and decentralised approaches complement each other. Network security is centrally important, for instance via firewalls. Network security provides more than just secure networking within the company. It also guarantees the confidentiality, integrity and availability of data and systems in a network. Endpoint security protects (decentrally) the different devices of a network - such as PCs, laptops, smartphones and MFPs - from malware.
The state of IT security - whether centralised or decentralised - should be checked regularly. There are several options for this as well.
Vulnerability scan: the system check
During the vulnerability analysis, the entire system, i.e. all networks and devices, is checked for security gaps and vulnerabilities and then evaluated. In the first step, the vulnerability scan, specialised software programmes run through the system. In this way, potential dangers are identified and classified. In the second step of the vulnerability analysis, the reporting, the vulnerabilities are listed in a weighted manner. Concrete countermeasures are derived from this in order to increase IT security quickly and as permanently as possible.
Vulnerability analyses are customised to the company. They only optimise IT security in the long term, if they are repeated on a regular basis. This is the task of vulnerability management. TA Triumph-Adler offers vulnerability analyses as a service with its specialised partners.