IT Security Consulting

IT Security Consulting

In the Security-Consulting division we focus on the topics of Identity & Access Management as well as the IT security of your IT operations. After all, the right access protection for your applications and data is one of the greatest security-related challenges. With the introduction of an IAM tool, companies are subject to strict regulatory requirements and can withstand audit analyses and avoid high security risks. We support you in the selection of IAM tools, their implementation and the necessary business and technical process adjustments.

Identity & Access Management Consulting

Our IAM team advises and supports you throughout the entire life cycle of your IAM solution. We offer all essential components for an IAM implementation project and the subsequent operation of the IAM system.

IAM Architecture

We select the most suitable IAM solution for your company and create the technical design for a later implementation. We follow a catalogue of criteria which is developed by aomation and work out the most suitable solution.

IAM Implementation Services

The implementation of an Identity & Access Management System takes place in several phases and depends on the scope of the selected IAM functionalities. Our IAM team accompanies the project up to "going live" and is also available for advice and support after going live.

IAM Production Support

For productive IAM systems aomation offers a special service: our IAM Production Support Team is remotely available for all questions in the productive phase. So you can continue to have fast and uncomplicated access to IAM experts who understand your IAM system.

IT Secure Operations

Companies are faced with the ever-growing challenge of their IT operations in accordance with internal and legal requirements such as EU-GDPR, and are forced to minimize the "business impact" as much as possible.

We investigate and identify possible fields of action in your IT-Operation and develop concepts, action plans and solutions for your Secure Operation.

Security Compliance

We perform a gap and risk analysis in the areas of security governance and cloud security and develop a resulting catalog of measures and ensure its implementation.

Secure Operation

Secure Operation takes special care of the access rights in your company. In particular, topics such as authentication and single sign-on are of central importance for a secure IT operation.

Secure Setup

Secure Setup is dedicated to the field of data security and the development and implementation of concepts to protect all digital data in your company.

Infrastructure Security

In the area of Infrastructure Security, Network Security is also of particular importance to us. Here we take over all necessary tasks for the planning, execution and monitoring of a secure network operation. This includes the consideration of the technology used as well as the applicable legal regulations.