dreieckCGF LLC | WE OFFER SOLUTIONS! 

PIM Privileged Identity Management

Privileged accounts depict the entry to important system- and information assets of a company. Cyber attackers selectively choose these privileged and technical accounts. Therefore virtually all severe security violations deal with privileged accounts which are adopted and exploited by potential assailants whereby the whole organization can be compromised.

To counter these modern endangerments for a company, preventive measures should be undertaken such as:

  • Protection of privileged accounts, as entries to important and critical system- and information assets of a company.
  • Penetration tests on a regular basis.
  • Acquisition, documentation and auditing of privileged and technical accounts.
  • Establishment of an entire security platform for privileged and technical accounts as a logical option to shelter what´s crucial.
  • Establishment of management processes for privileged and technical accounts within the framework of auditing processes for example in bank- or insurance companies. Hereby the CGF is standing by its customers to opt for the right systems and technologies. Furthermore in collaboration with our customers, we develop global processes to shield privileged and technical accounts from cyber-attacks and misuse.

The mutual goal here is to prevent potential offences before any damage could be inflicted to a company.

As a customer you can develop, compile and administer several privileged and technical accounts together with the CGF in the context of a management resolution with the purpose of designing and ensuring an effective interception. An overall acquisition of all privileged and technical accounts with one integrated security remedy is another alternative.

Please contact us for our active support and consultancy.

PAM Privileged Access Management

Privileges ensure the accession to crucial systems, information and processes of a company. Furthermore they enable the administration and configuration of important processes on the operating system´s level. Nonetheless, before an extensive privileged access management can be put into effect, fundamental tasks in the field of privilege management have to be completed.

To minimize those endangerments several measures are needful:

  • Active privilege management.
  • Cancellation of administration rights in the entire company and managing them.
  • Minimizing the risks of attackers obtaining access to your data.
  • Observation of necessary compliance guidelines.
  • Cancellation of unnecessary access rights.
  • Whitelisting of applications.

By an active privilege management our customers accomplish more efficient sequences of operations.

Virtually 80 per cent of all successful attacks occur due to extended existing access rights.

Implementing a capacious privilege management is not a task of years, it could be conducted within hours.

We organize this for our customers to:

  • Stop insider threats.
  • Stop ransomware attacks.
  • Stop zero day attacks.
  • Stop social engineering attacks.

Please contact us for our active support and consultancy.

PUM Privileged User Management

PKI Public Key Infrastructure

CKM Cryptographic Key Management

Certificates and encryption material depict the entry to important system- and information assets of a company furthermore they enable a safe communication among systems. Therefore it is important to shield those and to minimize the possibility of attacks.

  • Penetration tests on a regular basis for sufficiently gathering, documenting and auditing certificates as well as encryption material.
  • Monitoring of certificates and encryption material.
  • Intercepting cyber-attacks that specifically utilize outdated positions of trust.
  • Immediate detection of security breaches with certificates and encryption material for reduced reaction times.

As protection against those modern endangerments it is crucial to establish an entire security platform for certificates and encryption material as a logical option to shelter what´s crucial. Hereby the CGF is standing by its customers to opt for the right systems and technologies. Furthermore in collaboration with our customers, we develop global processes to shield certificates and encryption material from cyber-attacks and misuse.

  • Certificates and encryption material make up a vital point in the scope of auditing for example in bank and insurance companies which demand the implementation of management processes. The manufacturers of browser- and middleware systems already react and do not admit the usage of outdated or already cracked algorithms. Our mutual goal here is to prevent potential offences before any damage could be inflicted to a company.
    • Preventing attacks and extensive damage as well as supporting a company in implementing an active management of positions of trust. As a customer you can develop, compile and administer your encryption material together with the CGF in the context of a management resolution with the purpose of designing and ensuring an effective interception. Furthermore this permits an essential monitoring of runtimes as well as the automation of manual processes. An overall acquisition of all privileged and technical accounts with one integrated remedy is another alternative.
  • Within the scope of ISO 15118 or ISO 15782 we are collaborating with major manufacturers to implement these requirements.

Please contact us for our active support and consultancy.

 

Meet the team
Key to our success are our highly qualified employees. Our teams are based on trustworthy and respectful cooperation. We place great emphasis on interdisciplinary and independent teams, in which everyone can bring in their own individuality and professionally.

We live a flat team hierarchy and consequently base our work on values such as honesty, reliability, respect and responsibly. A trustful and long-lasting partnership is what we stand for equally with our clients as well as within our teams. To anchor these values, we attach importance to self-responsibility of each individual. We foster intrinsically motivated teams who are committed to delivering outstanding results to our customers. We focus on a healthy work climate with the culture of mutual support and high trust.

All this crowned with exciting projects and challenges makes us a strong partner for our customers!

Get to know us!

Mary Glenn

Mary Glenn

 

 

Vannessa Hufstetler

Vannessa Hufstetler

 

 

Christopher Rose

Christopher Rose

 

 

 

 

 

Bernd Heckelmann

SBernd Heckelmann

 

 

Bruce Anderson

Bruce Anderson

 

 

Dirk Brusch

Dirk Brusch

 

 

 

 

 

Jeff Stein

Jeff Stein

 

 

Kevin Brusch

Kevin Brusch

 

 

Steven Queen

Steven Queen

 

 

 

 

 

Tom Corbit

Tom Corbit

 

 

Vivien Brusch

Vivien Brusch

 

 

Mac Oxford

Mac Oxford

 

 

 

 

 

James Conley

James Conley

 

 

Angela Clark

Angela Clark

 

 

Conner LLoyd

Conner LLoyd

 

 

 

 

 

Rahul Raghatate

Rahul Raghatate

 

 

 

Responsible for content:

CGF CounselGroupFrankfurt, LLC
119 N Markley Street
Greenville, SC 29601

Office: 864-312-5044
Fax: 864-271-4277
Web: www.cgf-llc.com
E-Mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Collection of Information We collect personally identifiable information, like names, postal addresses, email addresses, etc., when voluntarily submitted by our visitors. The information you provide is used to fulfill you specific request. This information is only used to fulfill your specific request, unless you give us permission to use it in another manner, for example to add you to one of our mailing lists.

Distribution of Information We may share information with governmental agencies or other companies assisting us in fraud prevention or investigation. We may do so when: (1) permitted or required by law; or, (2) trying to protect against or prevent actual or potential fraud or unauthorized transactions; or, (3) investigating fraud which has already taken place. The information is not provided to these companies for marketing purposes.

Commitment to Data Security Your personally identifiable information is kept secure. Only authorized employees, agents and contractors (who have agreed to keep information secure and confidential) have access to this information. All emails and newsletters from this site allow you to opt out of further mailings.

Privacy Contact Information If you have any questions, concerns, or comments about our privacy policy you may contact us using the information below: By e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. By Phone (864) 312-5044

 

 

CGF AG | Administrative Headquarters, Ziegelsdorf, Germany

CGF AG | Frankfurt, Germany

CGF AG | Munich, Germany

CGF LLC | Greenville, USA (South Carolina)

CGF Asia Co. Ltd. | Bangkok, Thailand

CGF S.A. de C.V. | San Luis Potosí, Mexiko

 standorte weltkarte

News