Main Content

Management of information security

Integral IT security tailored to your needs

Skills and know-how

Analysis

  • Weak point analysis (for example when certification is coming up) taking into consideration technical, organisational and legal aspects.
  • We will show you where you stand with a quick check of your IT security or an IT security assessment
  • Risk analysis of integral security covering buildings, IT users, network, systems, applications

Concept

  • Putting a long-term IT security awareness campaign in place to raise the awareness of your IT users

  • Definition of a guide to information security and data protection

  • Integral security concepts covering access management, business continuity, user awareness and identities management

Implementation

You can also count on our support during implementation.

You can access professionals from our one-stop shop for all aspects of IT security systems, from complete project planning through to evaluation and implementation.

We will train your users, establish processes and help you with continuous improvement.

Reference projects

ISDS for Swiss alarm control centre

USP was commissioned by an alarm control centre that operates throughout Switzerland to assist in its large-scale project for replacing its entire infrastructure and software provision. Completely novel threat scenarios have to be considered now that telephone-based alarm systems are being replaced by IP-based systems. A comprehensive ISDS was drawn up for all the perimeter components for consideration against a risk portfolio.

Our consultant prepared the customer for and assisted him with audits as part of his project assistance role.

IT security manager in public administration

Taking on the IT security manager's (IT-SIBE) role for the canton for a time. Our consultants took on responsibility for: drawing up and maintaining the IS principles, supporting the responsible authorities in gathering data concerning the use of ICT systems in the canton for criminal procedures or other purposes, representation of the canton at IS specialist organisations, professional consultancy and verification of ICT projects.

IT security assessment for a transport company

The customer is given an up-to-date and comprehensive overview of the technologies deployed and the interfaces present for managing digital identities and an estimate of the areas for actions and challenges in this field. In a second step, practical proposals are drawn up for solutions that can be implemented quickly in the most important action areas.

Contact

Contact us for further information and queries regarding IT security consultancy.

Contact

Downloads

Download technical information, quotes and presentations on the management of information security.

Management of information security downloads