Stay safe!

Cyber-crime threats are among the greatest threats to businesses today. Compromised security measures and data theft can have devastating consequences. The security and productivity of companies is therefore increasingly dependent on their system infrastructure and measures implemented to protect it.

With a comprehensive and integrated range of security services and products, S&T provides state-of-the-art security for its customers. Implementation, configuration and operation of firewalls are as much a part of the service as client and server security and consulting and implementation of Azure information protection in the Office 365 environment.

The very latest technologies are used: S&T provides customers with behaviour-based security products, for example, with sandboxing functionality and application aware Level 7 firewalls. Together with the professional application of proven methods such as Cybersecurity Kill Chain, Zero Trust and Microsegmentation, a maximum of security can be guaranteed.

Security


S&T security services

Consulting: Successful security projects need to be based on sound analysis and a thorough understanding of the customer's requirements. At the beginning of such a project there is always a precise analysis of the existing IT landscape and customer requirements plus threat scenarios. 

Integration: In the next step S&T implements projects in the chosen security environment. During the implementation process S&T follows the recommendations of PRINCE2 methodology in order to minimise implementation times and project risks.  

Outsourcing: S&T ensures that security components are configured and maintained within the framework of customised support models. This allows customers to concentrate fully on their core business.

Security environment services (excerpt)

Cloud, perimeter & data center 

Next-generation firewalls form the basis of the S&T security platform. Firewall services are provided at the network perimeter and within the network at logical trust boundaries. 

All data traffic is subjected to a single-pass check, checking the entire context of the application, the associated content and the user identity. To ensure the highest level of protection possible, additional behaviour-based systems such as sandboxing are also used.

Professional log & event management 

The logging service collates data from all logging services and makes it available as a central repository. This enables alerts to be given automatically in the event of security incidents and offers extended functionalities by comparing all relevant log information. 
Logs can be sorted into streams according to different search terms. Security relevant logs can be filtered and forwarded to the SIEM tool.

Powerful email security solutions 

Using modern next-generation mail security solutions, the security of mail services can be guaranteed regardless of their location - in the S&T data center, in a customer data center or in the cloud. 

In addition to classic mail security, services such as sandboxing or data loss prevention solutions can also be provided.

Reliable endpoint protection

S&T endpoint protection solutions feature first-class security with advanced detection capabilities such as behavioural analysis, machine learning and vulnerability protection, used in conjunction with other endpoint and server detection and recovery functions.

Security consulting

In cooperation with the Austrian Institute of Technology (AIT), S&T offers additional consulting services in the security sector. These include: 

  • Cyber security training & exercises
    The cyber security range (CASTLE) provides a virtual environment for flexible simulation of critical digital IT systems with different system components and user structures.
    Find out more (PDF in German)
  • GDPR consulting 
    Based on a four-stage consulting concept, customers are supported in the implementation of the EU General Data Protection Regulation. 
    Find out more (PDF in German)
  • ISMS consulting
    ISO/IEC 27001 consulting supports customers during the introduction of an information security management system (ISMS). This includes a detailed overview of security-relevant ICT services that need to be protected by applying appropriate measures.
    Find out more (PDF in German)
  • Penetration testing
    Ethical hacking is used with the consent of the client to penetrate their systems to provide feedback on the suitability of their security measures so that suggestions for improvement can be made.
    Find out more (PDF in German)
Security Services