ATTACK DETECTION SYSTEMS (ADS)
We support you, together with our partner TÜV Trust IT, in the entire field of ADS
ATTACK DETECTION SYSTEMS (ADS)
ATTACK DETECTION SYSTEMS (ADS)
We support you, together with our partner TÜV Trust IT, in the entire field of ADS
ATTACK DETECTION SYSTEMS (ADS)
ADS describe a service, technology alone does not fulfill the requirements of the BSI
ATTACK DETECTION SYSTEMS (ADS)
ADS describe a service, technology alone does not fulfill the requirements of the BSI
With increasing digitalization, the risks of cyber attacks have also been increasing for years. As a result, processes, customer data and company secrets have long been considered critical information. Many companies have recognized this threat and have already invested heavily in expanding their security infrastructure. Various legal provisions have also created a regulatory framework.
The problem is that it often takes several months before a cyber attack is detected, giving attackers plenty of time to look around the company and steal valuable information or use encryption to prepare for blackmail.
An attack detection system makes it possible to detect a cyber attack at an early stage and initiate an immediate response. The SzA acts as an alarm system and, thanks to its holistic approach, the information from all monitored systems is brought together and evaluated centrally. This rapid response prevents damage and saves the attacker time. It is not without reason that KRITIS operators are now forced to act and must implement an SCA by May 1, 2023. In doing so, they also fulfill the requirements of BSIG §8a. We are happy to support you with a wide range of services relating to this topic.
Don’t know whether you have to meet these requirements? – Find out more about the legal requirements here.
Procedure
Our customers benefit from various services relating to systems for attack detection (ADS)
PROCEDURE
Our customers benefit from various services relating to systems for attack detection (ADS)
- Pre-project ADS: As part of a preliminary project, we support you in the preparation of your tender for an SSA. We pay attention to the key aspects and ask the right questions in order to comply with existing legislation and select the right SCA.
- Tchnical inventory check: We analyze and evaluate your technical security infrastructure. You will receive a recommendation for action from us to effectively secure your company.
- IT-Security Consulting: We advise you on your path to the best possible protection against cyber attacks. We compare your IT security infrastructure with the standards required by law and define the steps to an optimized IT security landscape.
- BSI-LAW §8a AUDIT: In accordance with BSIG §8a (3), KRITIS operators are also required to provide the BSI with evidence of the use of an attack detection system every two years. We are happy to carry out this audit for you. Learn more here.
- ADS audits according to EnWG §11 (1f) for companies in the energy sector via TÜV AUSTRIA Deutschland GmbH.
Your Benefit
- As TÜV, we know the legal regulations on the subject of systems for attack detection (ADS). We help you to assess your situation and support you in implementing the necessary measures.
- SOC consulting and deployment of a SOC: We not only support you in taking stock of a suitable SOC and analyzing the security environment, but also offer you a high-performance SOC through our joint venture, Certified Security Operations Center GmbH.
With the provision of an email address, we would be pleased to send you further information regarding our SOCaaS.
* Fields marked with an asterisk are mandatory.