Our complete IT solutions

Modern Managed Workplace

A smoothly functioning IT infrastructure forms the backbone of a modern company. It is therefore important to check and maintain IT systems on a regular basis. Thanks to our Modern Managed Workplace, the security and availability of your IT system are optimized and disruptions or failures are avoided as far as possible. You also receive key figures on utilization trends and efficient support tools.

Our maintenance packages consist of four models – from bronze to silver and gold to platinum. You can individually determine the anti-virus protection in the model suitable for you or your company. To further increase the security of your IT system, you can choose from various options.

Typical challenges

Challenges

System failures

Challenges

Security gaps

Insufficient monitoring

Insufficient virus protection

Your advantages

Challenges

Minimized system failures

Challenges

Increased security

Comprehensive monitoring

Improved virus protection

Your successes

Challenges

Stable IT infrastructure

Challenges

Increased productivity

Scalable solutions

Targeted IT strategy

Managed Microsoft 365

Microsoft 365 with all its services (Teams, Office, Exchange, etc.) is now a central, important part of the corporate infrastructure at many companies. The various editions of Microsoft 365 cover almost all modern communication and collaboration needs.

Weihrich Informatik now offers a cost-optimized overall package that includes all proven Office functions, including of all security functions displayed in today’s modern business environment. This includes regular data backups and a holistic protection concept incl. advanced SPAM filtering.

That’s why we recommend our “Managed Microsoft 365”. With this complete package, we administer your entire Microsoft 365 environment and use additional tools to ensure that you are optimally protected against email threats, account takeovers and data loss at all times. This not only increases the security of your IT system, but also enables you to work efficiently with the booked applications at all times.

Typical challenges

Challenges

Email threats

Challenges

Data loss

Protection concept

Communication and collaboration

Your advantages

Challenges

Complete package

Challenges

Regular data backup

Modern safety functions

Efficient collaboration

Your successes

Challenges

Continuous improvement

Challenges

Minimize data loss

Maximum security

Seamless communication

Security package with analysis scan

The IT infrastructure is now one of the most important factors in ensuring the operation and continuous development of any company.

Are your systems state of the art? Existing infrastructures can be operated sensibly if the current status has been brought up to the latest state of the art through technical and organizational measures and the possibilities of protection systems, which are regularly supplemented by updates, are exhausted.

Over the last two years, there has been enormous development in the area of cyber security measures. These measures prevent threats or reduce their consequences. We therefore recommend that you analyze your IT infrastructure very carefully, including with regard to cyber security. In this analysis, we examine your entire network, including all devices involved, for vulnerabilities. Organizational processes that support your company’s IT security are also part of the analysis. On the basis of the subsequent report, consisting of the findings of the analysis and our recommendations for optimizing the current status, we will discuss with you the measures required and, if desired, implement them.

Typical challenges

Challenges

Updating the systems

Challenges

Cyber security measures

IT security guidelines

Access control

Your advantages

Challenges

Vulnerability analysis

Challenges

Improved IT security

Network security

Detailed report

Your successes

Keeping systems up to date

Challenges

Closing security gaps

Challenges

Improve cyber security

Risk reduction

Awareness training

User error – no, thank you! In modern IT infrastructures, users are the biggest security risk today – through carelessness or ignorance. Increase the security of your IT systems through targeted, ongoing awareness-raising and training of your employees on the subject of threats from the network. Weihrich Informatik offers a SaaS solution specializing in IT security – cost-effective and configured according to your needs, with an intuitive online training and education environment. Give your employees the tools they need to act correctly and with safety in mind. The special feature here is that the software used simulates all attack situations, whether phishing, ransomware, malware or the danger of portable media. Recurring training courses keep your employees’ safety awareness high in the long term. At the same time, you test your IT infrastructure for damage potential. Interested in increasing IT security? Then contact us right now!

Typical challenges

Challenges

User error

Challenges

Phishing attacks

Malware

Human weaknesses

Your advantages

Challenges

SaaS solution

Challenges

Simulated attack situations

Varied training courses

Comprehensible key figures

Your successes

Increased IT security

Challenges

Sensitized employees

Challenges

Prevention of cyber attacks

Measurable safety awareness

Flexible IT emergency system

A stable IT infrastructure is the backbone of a modern company.
Our flexible IT emergency system ensures that your IT functions smoothly even in the event of unexpected outages or planned maintenance or project work.

In addition, our ready-to-use IT emergency system offers flexible deployment options, whether for bridging peak loads, as a temporary test environment for new applications or to support migrations and upgrades.
You can rely on our expertise to make your IT infrastructure robust and future-proof.

 

Hardware specifications:

  1. 2 x DL380 servers: 2 socket CPU; 192 and 384 GB RAM; 2.7 and 8.5 TB internal disk
  2. iSCSI NAS: 24 TB storage capacity
  3. SAS Storage: 40 TB storage capacity
  4. Network: Multi 10Gbit connections
  5. Management: Integrated remote tools and iLO

 

Typical challenges

Challenges

System failures

Challenges

System restores

Emergency operation

Migrations

Restore tests

Temporarily required additional resources

Your advantages

Challenges

Minimized system failures

Challenges

Increased security

Efficient resource planning

Your successes

Stable IT infrastructure

Challenges

Increased productivity

Challenges

Scalable solutions

Targeted IT strategy

Swiss E-Mail Security with Sign

The secure transmission of emails is essential in today’s business world. Swiss E-Mail Security with Sign ensures that your e-mails are not only encrypted, but also digitally signed to guarantee the authenticity and integrity of the messages. This protects your communication from tampering and unauthorized access while meeting the highest data protection and compliance requirements.

With Swiss E-Mail Security with Sign, you get a comprehensive solution for securing your e-mail communication that can be easily integrated into existing IT infrastructures. Trust in proven security and ensure the protection of your sensitive data.

Typical challenges

Challenges

Spam

Challenges

Phishing

Viruses in mails/attachments

Signing

Your advantages

Challenges

Spam and phishing are blocked before delivery

Challenges

Trained staff check the mails

Signing confirms unchangedness

Connection to networks

Your successes

Significant decrease in spam mails

Challenges

Outgoing mails (e.g. with a hacked account) are also blocked

Challenges

Signing by certificate for hundreds of users

More IT security through secure communication

Penetration testing

In an increasingly networked world, the security of IT systems is of crucial importance. Penetration testing provides a systematic review of your IT infrastructure to identify vulnerabilities before they can be exploited by attackers. With our comprehensive penetration tests, we simulate targeted attacks on your systems to identify security gaps and recommend measures to improve the security situation.

Our penetration testing services offer customized solutions for your specific requirements – from external tests to comprehensive internal analyses. You receive detailed reports on any vulnerabilities found and specific recommendations for improving your IT security so that your systems remain protected against cyber attacks in the future.

Typical challenges

Challenges

Identification of potential weak points

Challenges

Maintaining test accuracy in constantly changing IT environments

Minimizing the impact on the live system during testing

Regular review of new attack methods

Your advantages

Challenges

Early detection of security vulnerabilities

Challenges

Increasing safety through targeted remedial efforts

Improvement of security guidelines and practices

Continuous optimization of security through regular tests

Your successes

Successful identification and elimination of critical vulnerabilities

Challenges

Improving the overall security situation

Challenges

Proof of elimination of weak points helpful as a CIP measure, e.g. for ISO audits

Long-term risk reduction through targeted measures

Incident Response

In the event of a security incident, quick and targeted action is crucial to minimize damage and restore the affected systems. Our incident response services offer you support in responding immediately to cyber attacks, data theft or system failures. Using a structured approach, we analyze the incident, isolate affected systems and take measures to bring the situation under control.

By combining technical expertise and proven processes, our incident response team helps to prevent further damage and quickly restore your company’s IT security. Rely on our experience to effectively protect your systems in an emergency and prevent future incidents.

Typical challenges

Challenges

Rapid identification and response to security incidents

Challenges

Coordination between different teams and departments

Ensuring full recovery after an incident

Identification of the cause and prevention of future incidents

Your advantages

Challenges

Reduction of downtimes through rapid response

Challenges

Minimization of financial damage through efficient measures

Protecting the company’s reputation through effective crisis management

Preparation of detailed incident reports to optimize prevention

Your successes

Successful handling of security incidents

Challenges

Shortening the response time

Challenges

Development of a robust incident response plan

Reduction of the extent of damage in future incidents

Web Application Firewall

Web application protection is essential in today’s digital landscape. The Barracuda Web Application Firewall provides comprehensive protection against threats such as SQL injections, cross-site scripting and DDoS attacks. It protects your web applications and APIs from known and unknown vulnerabilities without compromising performance or user experience.

With advanced threat detection, automatic attack detection and integrated security updates, the Barracuda Web Application Firewall ensures that your web applications are continuously protected against new threats. At the same time, it offers full transparency and control over your security settings so that you can ensure the highest security standards at all times.

Typical challenges

Challenges

Protection against a wide range of web attacks

Challenges

Ensuring application availability with high traffic

Defense against DDoS attacks

Regular updates and adjustments to the safety rules

Your advantages

Challenges

Complete OWASP Top 10 coverage

Challenges

Integration into our XDR platform

Unlimited DDoS protection included

Simple administration and continuous updates

Your successes

Defense against web attacks

Challenges

Improving application performance and availability

Challenges

Visibility with regard to the security of your web application

Reduction of false alarms

Secure Edge

As workplaces and applications increasingly move to the cloud, protecting your network is becoming more complex. Barracuda Secure Edge provides a holistic solution to securely connect and protect your users, devices and applications in distributed locations. With integrated Zero Trust Network Access (ZTNA), firewall functionalities and secure SD-WAN, Secure Edge ensures access to applications and data, regardless of where your employees are located.

Barracuda Secure Edge allows you to centrally manage and enforce security policies while ensuring optimal network performance. Protect your network from modern threats and ensure a secure, seamless connection for your remote and cloud environments.

Typical challenges

Challenges

Securing the network edges with increasing use of IoT devices

Challenges

Integration of remote workstations into the company network

Compliance with data protection regulations

Scaling network security with growing traffic

Your advantages

Challenges

Comprehensive protection for decentralized networks

Challenges

Scalable solutions for growing network environments

Support for zero trust network access

Simple administration and provision of security policies

Your successes

Securing remote endpoints

Challenges

Reduction of network violations

Challenges

Visibility with regard to the security of your web application

Reduction of false alarms

Our AI/LLM solution

In a data-driven world, our AI/LLM solution enables companies to analyze their data efficiently and make intelligent decisions. With state-of-the-art machine learning algorithms and comprehensive data integration options, the solution offers tailor-made approaches for optimizing business processes and automating tasks.

From predictive maintenance to intelligent business analytics, our solution helps companies harness the power of their data and gain a competitive advantage. With flexible application models and a user-friendly interface, companies can seamlessly integrate AI into their existing systems to drive data-driven efficiency and innovation.

Typical challenges

Challenges

Manual and repetitive tasks performed by people

Challenges

Evaluation of unclear data

Manual modification of Excel files or similar tools

Evaluate logs and reports

Your advantages

Challenges

Automated execution of repetitive tasks

Challenges

Effective evaluation of opaque data sets

Customized apps for specific use cases

Large selection of different AIs

Your successes

Halving the effort for evaluations

Challenges

Have repetitive and boring tasks performed by AI

Challenges

Integration of various AI solutions

Development of own apps

Individual solutions for your company

Discover our customized services that are tailored to your specific needs and those of your employees. We offer a wide range of solutions, including training courses, strategy packages, investment packages, communication packages, update packages and data packages. Let our experts advise you and optimize your IT infrastructure, communication costs and investment planning to increase the efficiency of your company.