InfoGuard AG (Headquarter)
Lindenstrasse 10
6340 Baar
Switzerland
InfoGuard AG
Stauffacherstrasse 141
3014 Bern
Switzerland
InfoGuard Deutschland GmbH
Landsberger Straße 302
80687 Munich
Germany
Do you want to be sure that your cyber security is built on a solid and reliable long-term foundation and can also be quickly and easily adapted to future requirements? Our experts support you in formulating a long-term security strategy or in setting up a flexible framework for the structured management and targeted minimisation of all ICT risks. A cyber security framework (Information Security Management System) not only helps you to better manage your internal risks, the structured framework also greatly simplifies the implementation of compliance and risk management requirements.
Our ISMS/DSMS services include:
Do you want to be sure that your cyber security is built on a solid and reliable long-term foundation and can also be quickly and easily adapted to future requirements? Our experts support you in formulating a long-term security strategy or in setting up a flexible framework for the structured management and targeted minimisation of all ICT risks. An NIST-based cyber security framework not only helps you to better manage your internal risks, the structured framework the implementation of compliance and risk management requirements.
We advise and support you on the following topics:
With our Table-Top Exercises (TTX), we review the existing cyber security & recovery processes together with you and your team on the basis of formulated scenarios. These scenarios deal with the strategic crisis organisation and/or the IT operational level. The focus is on building organisational and operational skills (crisis organisation, communication, reporting obligations in the event of cyber and data protection incidents, recovery, etc.) through the scenario-based simulation of crisis situations.
With our many years of experience in the field of cyber security, we have the expertise to support you in setting up or optimising your Cyber Supply Chain Risk Management (C-SCRM). Systematic C-SCRM improves your security level in your supply chain, reduces your own cyber risks and ensures compliance requirements are met.
We advise and support you on the following topics:
At first glance, digitalisation and data protection are difficult to reconcile. However, successful digitalisation requires the inclusion of data protection and is therefore a strategically important issue – for every company. The data protection experts at InfoGuard support you across the board when it comes to these issues: from questions relating to data protection requirements, analysis, strategy definition and conception to sensitisation and implementation.
Our data protection services include:
Compliance requirements such as ICS, CH revDSG, EU GDPR, NIS2, CRA, DORA, FINMA, SWIFT, PCI DSS or SIC are constantly changing and becoming ever more extensive. InfoGuard helps you to optimally implement and efficiently operate the various compliance requirements. We advise you on the applicable requirements. We also support you in analysing and implementing security measures in accordance with the relevant specifications. This ensures that the legal requirements are consistently complied with and correctly implemented on an ongoing basis.
We advise and support you on the following topics:
Do you want to improve your cyber security by setting up an information security management system (ISMS) in accordance with ISO 27001 or optimise your existing ISMS? Our experienced and certified auditors will accompany you on the way to ISO 27001, ISO 27701, TISAX, IEC 62443, CMMC certification.
We advise and support you on the following topics:
We help you to set up an appropriate network and security architecture. Based on the ISO 27001 standard, we identify the missing elements in a gap analysis and highlight the associated risks. An action plan is then drawn up as a basis for operational implementation and prioritised according to risk. This ensures that you’ll be able to react quickly to new requirements in the future and put optimal IT security measures in place.
We advise and support you on the following topics:
The demands on cloud security governance are growing ever faster. In an age of Azure, AWS, GCP and many other cloud services, managing information and data correctly is essential, but also complex. There is often a lack of a holistic approach to guaranteeing the availability, confidentiality, integrity and traceability of information and data. Our cloud governance service ensures that the provision of resources, system integration, data security and other aspects of cloud computing is properly planned, considered and managed. InfoGuard helps you to optimally implement and efficiently operate the various requirements.
Modern information and communication technologies are networking the industrial world. Operational technology (OT) is of great interest to cyber criminals because the increasing automation of industrial processes requires OT and IT technologies to be networked, which is changing the threat and risk landscape. Your OT infrastructures are also business-critical. Our services enable you to identify potential vulnerabilities in your IoT, OT, Industry 4.0 or smart infrastructure at an early stage and initiate appropriate protective measures.
Our experienced OT specialists help you to verify the key components, set up the architecture in line with the defence-in-depth approach, implement security in accordance with IEC 62443, establish suitable supplier risk management and thus contribute significantly to reducing security risks.
Our OT security services at a glance:
The SAP security service provides you with a comprehensive overview of the security of your SAP systems. Our experienced SAP security experts support you from the conceptualisation and definition of processes through to the implementation of measures and the review of your SAP systems.
We advise and support you on the following topics:
By using cloud services and personal devices (BYOD), users can access data from anywhere. As a result, access management (privileged access management PAM and identity & access management IAM) has shifted from a perimeter-based to an identity-centred approach. As such, identity governance & administration becomes a key function and a prerequisite for strategic security objectives such as:
With our 360° view and our business-to-identity services, we support your endeavours from planning and operation through to compliance. Our process model enables effective and sustainable implementation of identity governance & administration. Success factors are a high level of automation and integration. We accompany you on the way to viable PAM & IAM solutions that are impressive in legal, technical and organisational terms.
Your business processes only work if the right information is always available in the right place at the right time. Confidentiality, integrity and availability of information play an important role here. Our independent and tailored cyber security assessment will show you which organisational, technical, personnel and legal vulnerabilities exist in your company and which improvement measures are expedient.
As part of our security analyses, our experienced and certified experts review your concepts, procedures, infrastructure, processes and organisational structures in accordance with various international security and industry guidelines. This gives you the certainty that the defined objectives are achieved in accordance with best practice and that undesirable events are prevented. The answers as to whether the existing measures are sensible and appropriate complete the safety checks.
Im InfoGuard Cyber Defence Center (CDC) in der Schweiz arbeiten über 80 hochqualifizierte Cyber Security Expert*innen und Analysten. Das CDC an unserem Standort in Baar ist ISO 27001 zertifiziert und ISAE 3000 Typ 2 überprüft. Es verfügt über ein mehrstufiges, physisches Sicherheitskonzept und die Sicherheitssysteme werden rund um die Uhr überwacht. Die vitalen, technischen Komponenten sind mehrfach ausgelegt und garantieren höchste Verfügbarkeit. Gleichzeitig erfüllen wir die strengen Vorgaben des Datenschutzes (DSG und EU DSGVO/GDPR) und die Richtlinien für den schweizerischen Finanzsektor.
Zudem wird sichergestellt, dass die Daten ausschliesslich beim Kunden oder in unseren redundanten Rechenzentren in der Schweiz gespeichert werden. InfoGuard ist BSI-qualifizierter APT-Response-Dienstleister, Mitglied bei FIRST (Global Forum of Incident Response and Security Teams) und agiert zudem als Incident Response-Partner und Schadensabwickler von führenden Versicherungen, Brokern und Schadensabwicklern, was den hohen Qualitätsstandard der Cyber Defence und Response Services unterstreicht.
Zudem wird sichergestellt, dass die Daten ausschliesslich beim Kunden oder in unseren redundanten Rechenzentren in der Schweiz gespeichert werden. InfoGuard ist BSI-qualifizierter APT-Response-Dienstleister, Mitglied bei FIRST (Global Forum of Incident Response and Security Teams) und agiert zudem als Incident Response-Partner und Schadensabwickler von führenden Versicherungen, Brokern und Schadensabwicklern, was den hohen Qualitätsstandard der Cyber Defence und Response Services unterstreicht.
Bei all unseren Kunden mit einem MDR-Service konnten wir erfolgreich einen Business Impact durch Cyberangriffe verhindern.
Managed Detection & Response Services aus unserem CDC in der Schweiz
Experten in dedizierten SOC-, CSIRT- und Threat-Intelligence-Teams
Jahre SOC-Erfahrung & Kompetenz
Cyber Defence- & CSIRT-Kunden
Wochen für das strukturierte SOC-Onboarding
Die eigenentwickelte, hochskalierbare und On-Prem in der Schweiz betriebene InfoGuard Cyber Defence Platform bildet das Kernstück unserer Cyber Defence Services und basiert auf einer offenen XDR-Architektur.
Um sicherzustellen, dass wir Bedrohungen aus allen Blickwinkeln sehen, sammelt die Plattform Daten von Endgeräten, Netzwerken, IoT-/OT-Infrastrukturen, Cloudumgebungen und Identitäten.
Durch die Nutzung unterschiedlicher Erkennungsmethoden, einschliesslich Machine Learning, kann die Plattform schnell Anomalien und verdächtige Verhaltensweisen aufdecken und mit Erkenntnissen aus aktuellen Sicherheitsvorfällen, simulierten Cyberattacken und Threat-Intelligence-Feeds anreichern, um unsere Analystenteams zu unterstützen. Dank der Schwarmintelligenz von Hunderten Kunden, täglich Tausenden von Sicherheitsereignissen und hunderten IR-Fällen ist der bestmögliche Schutz und die schnellstmögliche Reaktion garantiert.
Durch die Nutzung unterschiedlicher Erkennungsmethoden, einschliesslich Machine Learning, kann die Plattform schnell Anomalien und verdächtige Verhaltensweisen aufdecken und mit Erkenntnissen aus aktuellen Sicherheitsvorfällen, simulierten Cyberattacken und Threat-Intelligence-Feeds anreichern, um unsere Analystenteams zu unterstützen. Dank der Schwarmintelligenz von Hunderten Kunden, täglich Tausenden von Sicherheitsereignissen und hunderten IR-Fällen ist der bestmögliche Schutz und die schnellstmögliche Reaktion garantiert.
Die Plattform bietet umfassende Transparenz und arbeitet nahtlos mit Ihrem bestehenden Technologie-Stack zusammen. Dies minimiert das Onboarding und eliminiert die Herstellerabhängigkeit. Zudem ist sichergestellt, dass sensitive Kundendaten jederzeit geschützt sind und ausschliesslich in unserem Data Center in der Schweiz gespeichert werden.