Skills and know-how
Weak point analysis (for example when certification is coming up) taking into consideration technical, organisational and legal aspects.
We will show you where you stand with a quick check of your IT security or an IT security assessment
Risk analysis of integral security covering buildings, IT users, network, systems, applications
Putting a long-term IT security awareness campaign in place to raise the awareness of your IT users
Definition of a guide to information security and data protection
Integral security concepts covering access management, business continuity, user awareness and identities management
You can also count on our support during implementation.
You can access professionals from our one-stop shop for all aspects of IT security systems, from complete project planning through to evaluation and implementation.
We will train your users, establish processes and help you with continuous improvement.
ISDS for Swiss alarm control centre
USP was commissioned by an alarm control centre that operates throughout Switzerland to assist in its large-scale project for replacing its entire infrastructure and software provision. Completely novel threat scenarios have to be considered now that telephone-based alarm systems are being replaced by IP-based systems. A comprehensive ISDS was drawn up for all the perimeter components for consideration against a risk portfolio.
Our consultant prepared the customer for and assisted him with audits as part of his project assistance role.
IT security manager in public administration
Taking on the IT security manager's (IT-SIBE) role for the canton for a time. Our consultants took on responsibility for: drawing up and maintaining the IS principles, supporting the responsible authorities in gathering data concerning the use of ICT systems in the canton for criminal procedures or other purposes, representation of the canton at IS specialist organisations, professional consultancy and verification of ICT projects.
IT security assessment for a transport company
The customer is given an up-to-date and comprehensive overview of the technologies deployed and the interfaces present for managing digital identities and an estimate of the areas for actions and challenges in this field. In a second step, practical proposals are drawn up for solutions that can be implemented quickly in the most important action areas.
Further information on our products and solutions can be found in our download area.