You concentrate on your core competences, our 360° attempt leads to your security.
Under "Enterprise Security Governance" we understand the steering and control of security aspects for Enterprises. That involves everything from the management's security strategies over organizational guidelines (e.g. password guidelines, working with e-mail), security concepts (e.g. data classification, protection from viruses) up to the realization of risk analysis and audits. During the projects we do marketing-, communication- and training measures, which supports the success of the projects.

Starting situation of the customer as the basis for our services:

Our customers have to fulfill diverse legal and other regulative duties:

Data protection act, KonTraG, tele service laws, Basel II etc. The legal demands concern enterprises of all industries. Person in charge is mainly the business management but as well the representative for securtiy and data protection. Especially the automotive area shows that large producers demand for a proof from their suppliers, that the IT is secured. The situation is analogous to the effort for Y2K and ISO9000 during the last years. Security increasingly becomes a quality- and with it a competition factor. This applys especially for IT service providers in the area of banks and insurances. Large businesses, especially those that are represented international or grew through acquisitions, do not have a complete picture of their security status. This leads to situations where for example the data in the head office are relatively safe but as soon as overlapping processes start (e.g. developement in Germany, production in international countries) the security level cannot be sustained.
added value for the customer:

  • The customer is enabled to proof that he fulfilled the legislator's demands and those of his own customers. This can as well be done as a certification (BS7799 through 3rd, BSI), in case the customer demands on this.
  • The customer gets a (partly measureable) ROI either through increased availability, low costs for recovery and problemhandling or by higher turnover through satisfied customers (higher sales or enforceability of higher prizes). Alternatively it is possible to speak of "Cost of no-Security" instead of "Return on Security Investments".
  • With a consequent use of Enterprise Security Governance, solutions can be found in an effective way in respect to the costs. Invests are only negotiated where they have an effective use.


Csecure differentiates from...
  • special suppliers through a comprised performance portfolio. We offer technology as well as processes and provide therewith a real "security management".
  • huge consulting comapanies, as we provide the whole process chain. That means we do not provide goods and services that are only used once and are forgotten afterwards, but implement "lived" security in the whole organisation up to the technology itself.