FOLLOW US ON:
HEADQUARTER POSTAL ADDRESS:
OUR OFFICE IS LOCATED HERE:
When it comes to an estimation of security consultancy in most systems, there are several questions which cannot be answered in detail upfront. In order to ensure an approach which is appropriate for a specific customer, HENSOLDT Cyber offers consultancy as a two stage process. This significantly reduces the financial risk of the customer that the IT consultancy extends the targeted goal for a specific product or system. Reason for that risk is that IT-Security is a vast field in which different solutions are appropriate for different customers, those solutions addressing different attack vectors which may be regarded or not. The protection means for said vectors significantly influences the necessary level of consultancy in the technical area.
In stage 1, HENSOLDT Cyber creates an overview of the system, listing relevant applied technologies and specifying how these are interconnected.
Those technologies typically are:
Possible attack vectors throughout the supply chain are identified by HENSOLDT Cyber and discussed with the customer, creating a list of attacks and associated risks from the customer’s point of view. The result of this stage is a list of attack vectors including a recommendation which of them shall be addressed in the further system/product development.
Based on a well understood system design and attack vectors which shall be addressed, recommendations for means to protect against those attacks shall be identified. Those recommendations shall be, in discussion with the customer, added to the system design.
Possible impacts on the design shall be identified in regards to:
This stage typically involves different experts on customer side leading to a detailed update of the system design covering all necessary aspects.
At the end of this stage, a detailed updated system design for the customer is available, upon which explicit decisions can be taken. Those decisions typically are done under consideration of the benefit of addressed attack vectors and the impacts on functional system design in addition to financial aspects. The updated system design does not mandatory include solutions from HENSOLDT cyber but alternative suppliers as well.
We are looking forward to hear from you. Please do contact us: firstname.lastname@example.org for further information.