Our complete IT solutions
Modern Managed Workplace
A smoothly functioning IT infrastructure forms the backbone of a modern company. It is therefore important to check and maintain IT systems on a regular basis. Thanks to our Modern Managed Workplace, the security and availability of your IT system are optimized and disruptions or failures are avoided as far as possible. You also receive key figures on utilization trends and efficient support tools.
Our maintenance packages consist of four models – from bronze to silver and gold to platinum. You can individually determine the anti-virus protection in the model suitable for you or your company. To further increase the security of your IT system, you can choose from various options.
Typical challenges
System failures
Security gaps
Insufficient monitoring
Insufficient virus protection
Your advantages
Minimized system failures
Increased security
Comprehensive monitoring
Improved virus protection
Your successes
Stable IT infrastructure
Increased productivity
Scalable solutions
Targeted IT strategy
Managed Microsoft 365
Microsoft 365 with all its services (Teams, Office, Exchange, etc.) is now a central, important part of the corporate infrastructure at many companies. The various editions of Microsoft 365 cover almost all modern communication and collaboration needs.
Weihrich Informatik now offers a cost-optimized overall package that includes all proven Office functions, including of all security functions displayed in today’s modern business environment. This includes regular data backups and a holistic protection concept incl. advanced SPAM filtering.
That’s why we recommend our “Managed Microsoft 365”. With this complete package, we administer your entire Microsoft 365 environment and use additional tools to ensure that you are optimally protected against email threats, account takeovers and data loss at all times. This not only increases the security of your IT system, but also enables you to work efficiently with the booked applications at all times.
Typical challenges
Email threats
Data loss
Protection concept
Communication and collaboration
Your advantages
Complete package
Regular data backup
Modern safety functions
Efficient collaboration
Your successes
Continuous improvement
Minimize data loss
Maximum security
Seamless communication
Security package with analysis scan
The IT infrastructure is now one of the most important factors in ensuring the operation and continuous development of any company.
Are your systems state of the art? Existing infrastructures can be operated sensibly if the current status has been brought up to the latest state of the art through technical and organizational measures and the possibilities of protection systems, which are regularly supplemented by updates, are exhausted.
Over the last two years, there has been enormous development in the area of cyber security measures. These measures prevent threats or reduce their consequences. We therefore recommend that you analyze your IT infrastructure very carefully, including with regard to cyber security. In this analysis, we examine your entire network, including all devices involved, for vulnerabilities. Organizational processes that support your company’s IT security are also part of the analysis. On the basis of the subsequent report, consisting of the findings of the analysis and our recommendations for optimizing the current status, we will discuss with you the measures required and, if desired, implement them.
Typical challenges
Updating the systems
Cyber security measures
IT security guidelines
Access control
Your advantages
Vulnerability analysis
Improved IT security
Network security
Detailed report
Your successes
Keeping systems up to date
Closing security gaps
Improve cyber security
Risk reduction
Awareness training
User error – no, thank you! In modern IT infrastructures, users are the biggest security risk today – through carelessness or ignorance. Increase the security of your IT systems through targeted, ongoing awareness-raising and training of your employees on the subject of threats from the network. Weihrich Informatik offers a SaaS solution specializing in IT security – cost-effective and configured according to your needs, with an intuitive online training and education environment. Give your employees the tools they need to act correctly and with safety in mind. The special feature here is that the software used simulates all attack situations, whether phishing, ransomware, malware or the danger of portable media. Recurring training courses keep your employees’ safety awareness high in the long term. At the same time, you test your IT infrastructure for damage potential. Interested in increasing IT security? Then contact us right now!
Typical challenges
User error
Phishing attacks
Malware
Human weaknesses
Your advantages
SaaS solution
Simulated attack situations
Varied training courses
Comprehensible key figures
Your successes
Increased IT security
Sensitized employees
Prevention of cyber attacks
Measurable safety awareness
Flexible IT emergency system
A stable IT infrastructure is the backbone of a modern company.
Our flexible IT emergency system ensures that your IT functions smoothly even in the event of unexpected outages or planned maintenance or project work.
In addition, our ready-to-use IT emergency system offers flexible deployment options, whether for bridging peak loads, as a temporary test environment for new applications or to support migrations and upgrades.
You can rely on our expertise to make your IT infrastructure robust and future-proof.
Hardware specifications:
- 2 x DL380 servers: 2 socket CPU; 192 and 384 GB RAM; 2.7 and 8.5 TB internal disk
- iSCSI NAS: 24 TB storage capacity
- SAS Storage: 40 TB storage capacity
- Network: Multi 10Gbit connections
- Management: Integrated remote tools and iLO
Typical challenges
System failures
System restores
Emergency operation
Migrations
Restore tests
Temporarily required additional resources
Your advantages
Minimized system failures
Increased security
Efficient resource planning
Your successes
Stable IT infrastructure
Increased productivity
Scalable solutions
Targeted IT strategy
Swiss E-Mail Security with Sign
The secure transmission of emails is essential in today’s business world. Swiss E-Mail Security with Sign ensures that your e-mails are not only encrypted, but also digitally signed to guarantee the authenticity and integrity of the messages. This protects your communication from tampering and unauthorized access while meeting the highest data protection and compliance requirements.
With Swiss E-Mail Security with Sign, you get a comprehensive solution for securing your e-mail communication that can be easily integrated into existing IT infrastructures. Trust in proven security and ensure the protection of your sensitive data.
Typical challenges
Spam
Phishing
Viruses in mails/attachments
Signing
Your advantages
Trained staff check the mails
Connection to networks
Your successes
Significant decrease in spam mails
Outgoing mails (e.g. with a hacked account) are also blocked
Signing by certificate for hundreds of users
Penetration testing
In an increasingly networked world, the security of IT systems is of crucial importance. Penetration testing provides a systematic review of your IT infrastructure to identify vulnerabilities before they can be exploited by attackers. With our comprehensive penetration tests, we simulate targeted attacks on your systems to identify security gaps and recommend measures to improve the security situation.
Our penetration testing services offer customized solutions for your specific requirements – from external tests to comprehensive internal analyses. You receive detailed reports on any vulnerabilities found and specific recommendations for improving your IT security so that your systems remain protected against cyber attacks in the future.
Typical challenges
Identification of potential weak points
Maintaining test accuracy in constantly changing IT environments
Minimizing the impact on the live system during testing
Regular review of new attack methods
Your advantages
Increasing safety through targeted remedial efforts
Continuous optimization of security through regular tests
Your successes
Successful identification and elimination of critical vulnerabilities
Improving the overall security situation
Proof of elimination of weak points helpful as a CIP measure, e.g. for ISO audits
Incident Response
In the event of a security incident, quick and targeted action is crucial to minimize damage and restore the affected systems. Our incident response services offer you support in responding immediately to cyber attacks, data theft or system failures. Using a structured approach, we analyze the incident, isolate affected systems and take measures to bring the situation under control.
By combining technical expertise and proven processes, our incident response team helps to prevent further damage and quickly restore your company’s IT security. Rely on our experience to effectively protect your systems in an emergency and prevent future incidents.
Typical challenges
Rapid identification and response to security incidents
Coordination between different teams and departments
Ensuring full recovery after an incident
Identification of the cause and prevention of future incidents
Your advantages
Minimization of financial damage through efficient measures
Preparation of detailed incident reports to optimize prevention
Your successes
Successful handling of security incidents
Shortening the response time
Development of a robust incident response plan
Web Application Firewall
Web application protection is essential in today’s digital landscape. The Barracuda Web Application Firewall provides comprehensive protection against threats such as SQL injections, cross-site scripting and DDoS attacks. It protects your web applications and APIs from known and unknown vulnerabilities without compromising performance or user experience.
With advanced threat detection, automatic attack detection and integrated security updates, the Barracuda Web Application Firewall ensures that your web applications are continuously protected against new threats. At the same time, it offers full transparency and control over your security settings so that you can ensure the highest security standards at all times.
Typical challenges
Protection against a wide range of web attacks
Ensuring application availability with high traffic
Defense against DDoS attacks
Regular updates and adjustments to the safety rules
Your advantages
Complete OWASP Top 10 coverage
Integration into our XDR platform
Unlimited DDoS protection included
Simple administration and continuous updates
Your successes
Defense against web attacks
Improving application performance and availability
Visibility with regard to the security of your web application
Reduction of false alarms
Secure Edge
As workplaces and applications increasingly move to the cloud, protecting your network is becoming more complex. Barracuda Secure Edge provides a holistic solution to securely connect and protect your users, devices and applications in distributed locations. With integrated Zero Trust Network Access (ZTNA), firewall functionalities and secure SD-WAN, Secure Edge ensures access to applications and data, regardless of where your employees are located.
Barracuda Secure Edge allows you to centrally manage and enforce security policies while ensuring optimal network performance. Protect your network from modern threats and ensure a secure, seamless connection for your remote and cloud environments.
Typical challenges
Securing the network edges with increasing use of IoT devices
Integration of remote workstations into the company network
Compliance with data protection regulations
Scaling network security with growing traffic
Your advantages
Comprehensive protection for decentralized networks
Scalable solutions for growing network environments
Support for zero trust network access
Simple administration and provision of security policies
Your successes
Securing remote endpoints
Reduction of network violations
Visibility with regard to the security of your web application
Reduction of false alarms
Our AI/LLM solution
In a data-driven world, our AI/LLM solution enables companies to analyze their data efficiently and make intelligent decisions. With state-of-the-art machine learning algorithms and comprehensive data integration options, the solution offers tailor-made approaches for optimizing business processes and automating tasks.
From predictive maintenance to intelligent business analytics, our solution helps companies harness the power of their data and gain a competitive advantage. With flexible application models and a user-friendly interface, companies can seamlessly integrate AI into their existing systems to drive data-driven efficiency and innovation.
Typical challenges
Manual and repetitive tasks performed by people
Evaluation of unclear data
Manual modification of Excel files or similar tools
Evaluate logs and reports
Your advantages
Automated execution of repetitive tasks
Effective evaluation of opaque data sets
Customized apps for specific use cases
Large selection of different AIs
Your successes
Halving the effort for evaluations
Have repetitive and boring tasks performed by AI
Integration of various AI solutions
Development of own apps
Individual solutions for your company
Discover our customized services that are tailored to your specific needs and those of your employees. We offer a wide range of solutions, including training courses, strategy packages, investment packages, communication packages, update packages and data packages. Let our experts advise you and optimize your IT infrastructure, communication costs and investment planning to increase the efficiency of your company.