Our complete IT solutions

Modern Managed Workplace

A smoothly functioning IT infrastructure forms the backbone of a modern company. It is therefore important to check and maintain IT systems on a regular basis. Thanks to our Modern Managed Workplace, the security and availability of your IT system are optimized and disruptions or failures are avoided as far as possible. You also receive key figures on utilization trends and efficient support tools.

Our maintenance packages consist of four models – from bronze to silver and gold to platinum. You can individually determine the anti-virus protection in the model suitable for you or your company. To further increase the security of your IT system, you can choose from various options.

Typical challenges

Challenges

System failures

Challenges

Security gaps

Insufficient monitoring

Insufficient virus protection

Your advantages

Challenges

Minimized system failures

Challenges

Increased security

Comprehensive monitoring

Improved virus protection

Your successes

Challenges

Stable IT infrastructure

Challenges

Increased productivity

Scalable solutions

Targeted IT strategy

Managed Microsoft 365

Microsoft 365 with all its services (Teams, Office, Exchange, etc.) is now a central, important part of the corporate infrastructure at many companies. The various editions of Microsoft 365 cover almost all modern communication and collaboration needs.

Weihrich Informatik now offers a cost-optimized overall package that includes all proven Office functions, including of all security functions displayed in today’s modern business environment. This includes regular data backups and a holistic protection concept incl. advanced SPAM filtering.

That’s why we recommend our “Managed Microsoft 365”. With this complete package, we administer your entire Microsoft 365 environment and use additional tools to ensure that you are optimally protected against email threats, account takeovers and data loss at all times. This not only increases the security of your IT system, but also enables you to work efficiently with the booked applications at all times.

Typical challenges

Challenges

Email threats

Challenges

Data loss

Protection concept

Communication and collaboration

Your advantages

Challenges

Complete package

Challenges

Regular data backup

Modern safety functions

Efficient collaboration

Your successes

Challenges

Continuous improvement

Challenges

Minimize data loss

Maximum security

Seamless communication

Security package with analysis scan

The IT infrastructure is now one of the most important factors in ensuring the operation and continuous development of any company.

Are your systems state of the art? Existing infrastructures can be operated sensibly if the current status has been brought up to the latest state of the art through technical and organizational measures and the possibilities of protection systems, which are regularly supplemented by updates, are exhausted.

Over the last two years, there has been enormous development in the area of cyber security measures. These measures prevent threats or reduce their consequences. We therefore recommend that you analyze your IT infrastructure very carefully, including with regard to cyber security. In this analysis, we examine your entire network, including all devices involved, for vulnerabilities. Organizational processes that support your company’s IT security are also part of the analysis. On the basis of the subsequent report, consisting of the findings of the analysis and our recommendations for optimizing the current status, we will discuss with you the measures required and, if desired, implement them.

Typical challenges

Challenges

Updating the systems

Challenges

Cyber security measures

IT security guidelines

Access control

Your advantages

Challenges

Vulnerability analysis

Challenges

Improved IT security

Network security

Detailed report

Your successes

Keeping systems up to date

Challenges

Closing security gaps

Challenges

Improve cyber security

Risk reduction

Awareness training

User error – no, thank you! In modern IT infrastructures, users are the biggest security risk today – through carelessness or ignorance. Increase the security of your IT systems through targeted, ongoing awareness-raising and training of your employees on the subject of threats from the network. Weihrich Informatik offers a SaaS solution specializing in IT security – cost-effective and configured according to your needs, with an intuitive online training and education environment. Give your employees the tools they need to act correctly and with safety in mind. The special feature here is that the software used simulates all attack situations, whether phishing, ransomware, malware or the danger of portable media. Recurring training courses keep your employees’ safety awareness high in the long term. At the same time, you test your IT infrastructure for damage potential. Interested in increasing IT security? Then contact us right now!

Typical challenges

Challenges

User error

Challenges

Phishing attacks

Malware

Human weaknesses

Your advantages

Challenges

SaaS solution

Challenges

Simulated attack situations

Varied training courses

Comprehensible key figures

Your successes

Increased IT security

Challenges

Sensitized employees

Challenges

Prevention of cyber attacks

Measurable safety awareness

Flexible IT emergency system

A stable IT infrastructure is the backbone of a modern company.
Our flexible IT emergency system ensures that your IT functions smoothly even in the event of unexpected outages or planned maintenance or project work.

In addition, our ready-to-use IT emergency system offers flexible deployment options, whether for bridging peak loads, as a temporary test environment for new applications or to support migrations and upgrades.
You can rely on our expertise to make your IT infrastructure robust and future-proof.

 

Hardware specifications:

  1. 2 x DL380 servers: 2 socket CPU; 192 and 384 GB RAM; 2.7 and 8.5 TB internal disk
  2. iSCSI NAS: 24 TB storage capacity
  3. SAS Storage: 40 TB storage capacity
  4. Network: Multi 10Gbit connections
  5. Management: Integrated remote tools and iLO

 

Typical challenges

Challenges

System failures

Challenges

System restores

Emergency operation

Migrations

Restore tests

Temporarily required additional resources

Your advantages

Challenges

Minimized system failures

Challenges

Increased security

Efficient resource planning

Your successes

Stable IT infrastructure

Challenges

Increased productivity

Challenges

Scalable solutions

Targeted IT strategy

Individual solutions for your company

Discover our customized services that are tailored to your specific needs and those of your employees. We offer a wide range of solutions, including training courses, strategy packages, investment packages, communication packages, update packages and data packages. Let our experts advise you and optimize your IT infrastructure, communication costs and investment planning to increase the efficiency of your company.