Secure IT infrastructure with @-yet
A favourite target for attacks
Protect the Active Directory
The Active Directory is the centrepiece of the IT infrastructure and is particularly worth protecting from an IT security perspective. It is responsible for user and system administration. And it is the basis for the organisation of authorisations in many companies. It is therefore of central importance for every IT organisation - and one of the most important targets for attackers.
The experts at @-yet GmbH support you in the sustainable protection of the Active Directory. This includes the implementation of hierarchical security structures (‘tiering model’) and the use of secure authentication methods and protocols. Through this and other hardening measures (e.g. via security GPOs), we prevent or make it more difficult for an attacker to gain higher or even the highest authorisation level in the IT infrastructure.
Security through separation
Network segmentation
The heart of every IT infrastructure is the network. It connects IT systems and allows them to communicate with each other, enabling collaboration even across location boundaries. Attackers exploit the weakest point in this complex network structure and try to gain access to your network and systems.
Network segmentation is a very effective means of preventing the spread of attacks in your network. Our security experts divide the company's network into smaller, individually secured sections. We restrict access to and between the individual segments according to the principle of the lowest possible authorisations (‘need-2-access’). @-yet supports you in classifying systems according to their respective security requirements.
Based on this planning, our teams design a finely segmented network with strict, secure rules for communication that are customised to your needs.
Unencrypted in an emergency
Protect backups from ransomware
According to the Sophos Ransomware Report 2024, almost 60% of all companies worldwide were affected by an attack by encryption malware in 2023. More than 800 companies were victims of an attack in Germany alone. When ransomware strikes, it encrypts data on all affected systems - and also attempts to compromise backup data.
@-yet supports you in setting up a ransomware-proof backup infrastructure. We protect your backup systems with technical and organisational measures such as media disruption or separate administration. In this way, we ensure that your data backups are safe from sabotage even in the event of a cyber emergency and that you are still able to recover.
Detect the attack when it happens
Detection of attacks
Many attacks on IT infrastructure follow the same or similar patterns. Recognising these patterns is the task of attack detection systems (SIEM), which is required for all relevant companies as part of NIS2, among other things. These systems are an integral part of a good security strategy and an effective way of recognising cyber attacks at an early stage. In order for these systems to recognise attack patterns, they require correlated information from the infrastructure, e.g. from connected log sources.
The security experts at @-yet support you right from the start in the planning and implementation of such a solution. Whether defining the requirements, identifying the required data sources, their technical connection or the processual implementation - @-yet is at your side with certified specialists.
Effective protection right to the end point
Endpoint security
All statistics come to the same conclusion: phishing is the most common gateway for cyber criminals. In the age of generative AI, fake emails that tempt people to click carelessly are difficult to distinguish from originals. Awareness training for employees increases the chance of preventing such an attack in advance.
However, a single careless click must not lead to a catastrophe.
Today, endpoint security is more than just virus protection. @-yet GmbH supports you in the interaction of all disciplines to protect your end devices.
- Virus protection
- Detection of attacks
- System hardening
- Encryption
- Protection while working from home
- Software and asset management
- Support and administration
Support from employees is an important aspect. @-yet designs a customised endpoint security solution for you and sensitises your team to the various threats.
Professionally close security gaps
Vulnerability management
A study by the BSI (Federal Office for Information Security) shows that 70 new vulnerabilities are found in software products every day. And the trend is rising. The more software your company uses, the higher the number of potential vulnerabilities. And many become a gateway for attackers to gain access to the company network or systems or to spread within them. In order to close these vulnerabilities as quickly as possible, companies need well thought-out vulnerability management as a continuous process.
@-yet GmbH provides comprehensive advice on product selection and design
- for identifying and assessing the risk of vulnerabilities
- identification of the affected assets and
- the elimination of vulnerabilities
with a concept and action plan customized to your needs.
Get advice from our security experts
Non-binding, free of charge, comprehensive. Make an appointment now!
The security and data protection experts at @-yet are available to provide you with a comprehensive initial consultation.
Phone : +49 2175 16 55 0
Email: info@at-yet.de
Or you can use this form to contact us.
We look forward to hearig from you!