PIM Privileged Identity Management

Privileged accounts depict the entry to important system- and information assets of a company. Cyber attackers selectively choose these privileged and technical accounts. Therefore virtually all severe security violations deal with privileged accounts which are adopted and exploited by potential assailants whereby the whole organization can be compromised.

To counter these modern endangerments for a company, preventive measures should be undertaken such as:

  • Protection of privileged accounts, as entries to important and critical system- and information assets of a company.
  • Penetration tests on a regular basis.
  • Acquisition, documentation and auditing of privileged and technical accounts.
  • Establishment of an entire security platform for privileged and technical accounts as a logical option to shelter what´s crucial.
  • Establishment of management processes for privileged and technical accounts within the framework of auditing processes for example in bank- or insurance companies. Hereby the CGF is standing by its customers to opt for the right systems and technologies. Furthermore in collaboration with our customers, we develop global processes to shield privileged and technical accounts from cyber-attacks and misuse.

The mutual goal here is to prevent potential offences before any damage could be inflicted to a company.

As a customer you can develop, compile and administer several privileged and technical accounts together with the CGF in the context of a management resolution with the purpose of designing and ensuring an effective interception. An overall acquisition of all privileged and technical accounts with one integrated security remedy is another alternative.

Please contact us for our active support and consultancy.

PAM Privileged Access Management

Privileges ensure the accession to crucial systems, information and processes of a company. Furthermore they enable the administration and configuration of important processes on the operating system´s level. Nonetheless, before an extensive privileged access management can be put into effect, fundamental tasks in the field of privilege management have to be completed.

To minimize those endangerments several measures are needful:

  • Active privilege management.
  • Cancellation of administration rights in the entire company and managing them.
  • Minimizing the risks of attackers obtaining access to your data.
  • Observation of necessary compliance guidelines.
  • Cancellation of unnecessary access rights.
  • Whitelisting of applications.

By an active privilege management our customers accomplish more efficient sequences of operations.

Virtually 80 per cent of all successful attacks occur due to extended existing access rights.

Implementing a capacious privilege management is not a task of years, it could be conducted within hours.

We organize this for our customers to:

  • Stop insider threats.
  • Stop ransomware attacks.
  • Stop zero day attacks.
  • Stop social engineering attacks.

Please contact us for our active support and consultancy.

PUM Privileged User Management

PKI Public Key Infrastructure

CKM Cryptographic Key Management

Certificates and encryption material depict the entry to important system- and information assets of a company furthermore they enable a safe communication among systems. Therefore it is important to shield those and to minimize the possibility of attacks.

  • Penetration tests on a regular basis for sufficiently gathering, documenting and auditing certificates as well as encryption material.
  • Monitoring of certificates and encryption material.
  • Intercepting cyber-attacks that specifically utilize outdated positions of trust.
  • Immediate detection of security breaches with certificates and encryption material for reduced reaction times.

As protection against those modern endangerments it is crucial to establish an entire security platform for certificates and encryption material as a logical option to shelter what´s crucial. Hereby the CGF is standing by its customers to opt for the right systems and technologies. Furthermore in collaboration with our customers, we develop global processes to shield certificates and encryption material from cyber-attacks and misuse.

  • Certificates and encryption material make up a vital point in the scope of auditing for example in bank and insurance companies which demand the implementation of management processes. The manufacturers of browser- and middleware systems already react and do not admit the usage of outdated or already cracked algorithms. Our mutual goal here is to prevent potential offences before any damage could be inflicted to a company.
    • Preventing attacks and extensive damage as well as supporting a company in implementing an active management of positions of trust. As a customer you can develop, compile and administer your encryption material together with the CGF in the context of a management resolution with the purpose of designing and ensuring an effective interception. Furthermore this permits an essential monitoring of runtimes as well as the automation of manual processes. An overall acquisition of all privileged and technical accounts with one integrated remedy is another alternative.
  • Within the scope of ISO 15118 or ISO 15782 we are collaborating with major manufacturers to implement these requirements.

Please contact us for our active support and consultancy.