Logo Concepture
Pfeil weiß

Digital Perimeter Security

Perimeter security is becoming increasingly important in IT security. This means, for example, setting a boundary between a company network and a public network such as the internet. Well established technologies for perimeter protection are firewalls, intrusion detection/prevention systems and security information and event management systems (SIEM).

IT security from both inside and outside
Besides regular penetration tests from outside, it’s important to ensure that your network is also adequately protected from the inside. This is where intrusion detection (IDS) and intrusion prevention systems (IPS) come into play. The IDS automatically detects and warns of attacks on computer systems or networks, based on certain patterns. The IPS goes one step further and fends off these attacks. Sound simple? It isn’t. In order to install an IPS, proper configuration of the IDS is indispensable in order to preclude false alarms, which can have far-reaching organisational and economic consequences.

Trust is good – open source is better
Our IT security experts can help you install IDS and IPS such as Snort, Security Onion or Suricata. Depending on your system environment, its data traffic and the corresponding internal encryptions, we’re happy to advise you on the most suitable open source software, and to carry out the configuration as well as the long-term maintenance for you. Here at Concepture, we possess in-depth expertise and also keep a close eye on current IT security trends and developments.

Security through Open Source!

Security Onion
Security Onion

YOUR CONTACT

Lukas Sökefeld
Cyber Security Consultant
Certified Ethical Hacker

Are you interested in our offer?
Contact us – directly by mail or phone.
We look forward to getting to know you and your company.

Tel. +49 (0)7223 808479-34