{"id":41,"date":"2021-05-25T11:50:46","date_gmt":"2021-05-25T11:50:46","guid":{"rendered":"http:\/\/cyseg.stock.mk\/?page_id=41"},"modified":"2021-06-28T20:20:22","modified_gmt":"2021-06-28T20:20:22","slug":"services","status":"publish","type":"page","link":"https:\/\/cyseg.de\/de\/services\/","title":{"rendered":"Leistungen"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;3.25.3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00ffd8&#8243; background_color_gradient_end=&#8221;#0029e2&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/cyber-security-18.png&#8221; parallax=&#8221;on&#8221; custom_padding=&#8221;10vw||&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;3.25.1&#8243; z_index=&#8221;1&#8243; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;Overpass|900|||||||&#8221; header_font_size=&#8221;40px&#8221; background_layout=&#8221;dark&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;54px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>Our Services<\/h1>\n<h3>This is what we do.<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||&#8221; custom_padding=&#8221;|||||&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<p style=\"text-align: left;\">CYSEG is a multi-disciplinary team of experts and researchers with a unique portfolio of services engineered to meet today\u2019s most demanding cyber security challenges. We support our clients to build and maintain resilient cyberspace by providing evidence-based security consultancy and training<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_image src=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/cloud-computing-security-abstract-concept-illustration_335657-2105-removebg-preview-1.png&#8221; title_text=&#8221;cloud-computing-security-abstract-concept-illustration_335657-2105-removebg-preview (1)&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.9.4&#8243; max_width_tablet=&#8221;400px&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;-10vw|0vw||&#8221; custom_margin_tablet=&#8221;-2vw|0vw||&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; animation_style=&#8221;zoom&#8221; animation_intensity_zoom=&#8221;5%&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25.1&#8243; z_index=&#8221;0&#8243; width=&#8221;100%&#8221; max_width=&#8221;none&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25.1&#8243;][et_pb_image src=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/cyber-security-13.png&#8221; show_bottom_space=&#8221;off&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.25.3&#8243; custom_margin=&#8221;0vw||-2px&#8221; custom_padding=&#8221;0px|||||&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Contact Form&#8221; _builder_version=&#8221;3.25.3&#8243; background_color=&#8221;#f1fafe&#8221; z_index=&#8221;10&#8243; min_height=&#8221;380px&#8221; custom_margin=&#8221;-3px|||||&#8221; custom_padding=&#8221;133px|||||&#8221; bottom_divider_height=&#8221;26vw&#8221; bottom_divider_flip=&#8221;horizontal&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3 class=\"elementor-image-box-title\">Identity and Access Management<\/h3>\n<p class=\"elementor-image-box-description\"><span>We provide customized IAM services at competitive pricing to your organization to efficiently manage issues related to security governance risk and compliance to deliver highly privileged solutions on verticals.\u00a0Our experts help you tackle your various IAM projects, identifying roadblocks, architecting and managing solutions that set you up for long-term success.<\/span><\/p>\n<p><b><span>Main Services Provided:<\/span><\/b><\/p>\n<ul>\n<li><span>Comprehensive life cycle management;<\/span><\/li>\n<li><span>Seamless and secure access;<\/span><\/li>\n<li><span>Identity governance and administration services;<\/span><\/li>\n<li><span>Advanced security;<\/span><\/li>\n<li><span>Identity and access strategy and assessment;<\/span><\/li>\n<li><span>Identity and access management design and deploy services; Strategy and roadmap implementation;<\/span><\/li>\n<li><span>Privileged account management;<\/span><\/li>\n<li><span>Identity intelligence and analytics;<\/span><\/li>\n<li><span>Federated identity management;<\/span><\/li>\n<li><span>Authentication and single sign on;<\/span><\/li>\n<li><span>Digital identity (cloud, mobile, iot);<\/span><\/li>\n<li><span>Reporting and security intelligence<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/iam_1-olvepkwuylexnphvkubcgrgobcxp6s1yetz2zacae8.jpg&#8221; title_text=&#8221;iam_1-olvepkwuylexnphvkubcgrgobcxp6s1yetz2zacae8&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/SIEM-System-olvepkwuylexnphvkubcgrgobcxp6s1yetz2zacae8.jpeg&#8221; title_text=&#8221;SIEM-System-olvepkwuylexnphvkubcgrgobcxp6s1yetz2zacae8&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3 class=\"elementor-image-box-title\">Event monitoring and incident response<\/h3>\n<p class=\"elementor-image-box-description\">Our expertise involves collecting and analysing information to detect suspicious behavior or unauthorised system changes on your network, defining which types of behavior should trigger alerts, and taking action on alerts as needed. We are covering the entire incident investigation cycle to completely eliminate the threat to your organization.<\/p>\n<p><b>Main services provided:<\/b><\/p>\n<ul>\n<li>Security event monitoring and escalation process and procedures;<\/li>\n<li>Common alerts triage and escalation procedures;<\/li>\n<li>Case management process and procedures;<\/li>\n<li>Third-party alert process and procedures;<\/li>\n<li>Knowledge Base and wiki management process and procedures;<\/li>\n<li>Security incident management processes and procedures<\/li>\n<li>Case management process and procedures;<\/li>\n<li>Investigation procedures;<\/li>\n<li>Malware analysis process and procedures;<\/li>\n<li>Platform content feedback process and procedures<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3 class=\"elementor-image-box-title\">Cyber Security Regulation<\/h3>\n<p class=\"elementor-image-box-description\">CYSEG provides an array of cybersecurity services including cybersecurity policy management, risk assessments, data protection, privacy and regulatory compliance consulting to businesses. We can support your organization to comply with prevailing regulatory requirements, respond to situations of noncompliance, and improve the processes around information systems supporting governance, risk and compliance.<\/p>\n<p><b>We specialize in the following compliance areas:<\/b><\/p>\n<ul>\n<li>PCI (Payment Card Industry) Compliance;<\/li>\n<li>HIPAA (Health Insurance Portability and Accountability Act) Compliance;<\/li>\n<li>FISMA (Federal Information Security Management Act) Compliance;<\/li>\n<li>ISO (International Standards Organization) 27001-27002 Compliance;<\/li>\n<li>SOX (Sarbanes-Oxley) Compliance;<\/li>\n<li>GDPR (General Data Protection Regulation) Compliance;<\/li>\n<li>NIST (The National Institute of Standards and Technology);<\/li>\n<li>FFIEC (Online Banking).<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/regulations-thumb-olvepkwuylexnphvkubcgrgobcxp6s1yetz2zacae8.png&#8221; title_text=&#8221;regulations-thumb-olvepkwuylexnphvkubcgrgobcxp6s1yetz2zacae8&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||250px||false|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/cyber-security-training-organization-olvepkwuylexnphvkubcgrgobcxp6s1yetz2zacae8.jpg&#8221; title_text=&#8221;cyber-security-training-organization-olvepkwuylexnphvkubcgrgobcxp6s1yetz2zacae8&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h3 class=\"elementor-image-box-title\">Cyber Security Training<\/h3>\n<p class=\"elementor-image-box-description\">Our team of experts and researchers is offering comprehensive training programs on different levels. Online courses also are available including access to e-learning platform and course materials.<\/p>\n<p><b>Comprehensive training programs are offered among other covering:<\/b><\/p>\n<ul>\n<li>Vulnerability Assessment and Penetration Testing;<\/li>\n<li>Malware Analysis;<\/li>\n<li>Incident Response;<\/li>\n<li>Cyber Risk Management;<\/li>\n<li>Digital Forensics;<\/li>\n<li>Crypto Currency and Blockchain;<\/li>\n<li>Cyber Security Awareness;<\/li>\n<li>Legal Aspects of Cyber Security, etc.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; _builder_version=&#8221;3.25.3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#3122b2&#8243; background_color_gradient_end=&#8221;#00ffd8&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/cyber-security-17.png&#8221; z_index=&#8221;10&#8243; overflow-x=&#8221;visible&#8221; overflow-y=&#8221;visible&#8221; custom_padding=&#8221;||10vw|||&#8221; locked=&#8221;off&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;3.25.3&#8243; background_color=&#8221;#ffffff&#8221; custom_margin=&#8221;-146px|auto|-2px|auto||&#8221; custom_padding=&#8221;0px||0px||true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-8px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.48)&#8221; locked=&#8221;off&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;60px|40px|60px|40px|true|true&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221;]<\/p>\n<h2>Let&#8217;s work together<br \/>\n<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;3.25.3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00f6ff&#8221; background_color_gradient_end=&#8221;#00ffbf&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cyseg.de\/groaseer\/2021\/05\/cyber-security-010-1.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_left&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;60px|40px|60px|20%|true&#8221; custom_padding_tablet=&#8221;80px|||40px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; background_last_edited=&#8221;on|desktop&#8221; background_image_tablet=&#8221;http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png&#8221; background_enable_image_tablet=&#8221;on&#8221; background_position_tablet=&#8221;top_left&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_text_align=&#8221;center&#8221; locked=&#8221;off&#8221;]<\/p>\n<h2>Speak to some of our experts<\/p>\n<\/h2>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/cyseg.de\/contact\/&#8221; button_text=&#8221;Book Appointment&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#003070&#8243; button_bg_color_gradient_end=&#8221;#001f4c&#8221; button_bg_color_gradient_type=&#8221;radial&#8221; button_bg_color_gradient_direction=&#8221;140deg&#8221; button_bg_color_gradient_direction_radial=&#8221;top right&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;20px|30px|20px|30px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our Services This is what we do.CYSEG is a multi-disciplinary team of experts and researchers with a unique portfolio of services engineered to meet today\u2019s most demanding cyber security challenges. We support our clients to build and maintain resilient cyberspace by providing evidence-based security consultancy and trainingIdentity and Access Management We provide customized IAM services [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-41","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyseg.de\/de\/wp-json\/wp\/v2\/pages\/41","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyseg.de\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyseg.de\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyseg.de\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyseg.de\/de\/wp-json\/wp\/v2\/comments?post=41"}],"version-history":[{"count":8,"href":"https:\/\/cyseg.de\/de\/wp-json\/wp\/v2\/pages\/41\/revisions"}],"predecessor-version":[{"id":221,"href":"https:\/\/cyseg.de\/de\/wp-json\/wp\/v2\/pages\/41\/revisions\/221"}],"wp:attachment":[{"href":"https:\/\/cyseg.de\/de\/wp-json\/wp\/v2\/media?parent=41"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}