Audit and compliance

Information Security

Today, well-regulated access control for end devices that attempt to connect to a corporate network forms a crucial part of a company's overall security policy. The basis for this control is a comprehensive inventory of all authorized devices.

NSA provides you with a complete overview of your corporate network at all times, and lets you know if the device attempting to connect is authorized and therefore risk-free, or whether it poses a potential risk and must be examined.

The range of services offered by NSA combines across-the-board standardization with individualization. Specialist knowledge about organizational and process matters enable us to give our customers cost-effective access to a unique offering, and to adapt it precisely to their changing needs.

Security for Web applications and Internet transactions
Protection of company networks by imposing strict access controls on all end-user devices. Web applications allow collaboration with customers, partners or within teams without the need for changes in media. However, the quantity and complexity of Internet-based attacks are increasing rapidly, and danger areas often expand without being noticed. That's why you should put your trust in tried-and-tested security with exceptional features as used by leading banks.

Security for internal networks
Protection of company networks with Internet access and access control for applications and data. Risks to internal company networks arise, for instance, when guests connect their computer to the network in publicly accessible areas such as meeting rooms. Malware that accidentally enters the network in this way can paralyse internal networks for days and even cause irreparable damage.

Security for worldwide corporate networks
Secure networking of multiple company sites, mobile users and home offices. Companies with several sites rely upon a company-wide, reliable and secure data network. Nowadays, controlled Internet access and simple, secure connection of mobile users and home workers are essential. Companies face the challenge of providing heterogeneous networks with effective, cost-efficient protection against complex risks, whilst maintaining optimum availability.

Alongside these three core areas, we also offer solutions in the following areas:

  • Identity & access management
  • Network zone architecture concepts
  • Consulting in the area of security organization and processes

It's up to you to determine the degree of restriction in controlling end devices. Together, we will lay down your individual set of rules, taking account of your specific situation, needs and security policy.