Do you want to switch the language?

Security for companies

download-logo-blue-3973ed3e5aa8df2f6b217e31c5300a7d

Cyber Security Report 2024.
We are sharpening our focus on cyber security.

Get our latest Cyber Security Report now and find out why!

The latest Cyber Security Report gets to the heart of the issue of IT security with facts and figures and current case studies. Vulnerabilities, threat scenarios, attack methods, counter-strategies and security solutions - the CANCOM Cyber Security Report emphatically points out the increasing danger of cybercrime, but also presents the appropriate responses.

Attacks on the IT of companies, organizations and administrations are increasing rapidly. For many companies, this is a scenario that threatens their very existence. It is not only traditional IT that is the target of cybercrime, operational technologies and machines in the manufacturing industry are also increasingly being targeted - a key topic of our latest report.

Request now

Under this link you will find our privacy policy.

Comprehensive IT security strategy

CANCOM Austria is familiar with the current hot topics in the field of IT security and meets them with advanced solutions:

01

Prevent

Uncovering weak points and structural problems

  • Technical workshops and gap assessments provide an overview
  • Audits for specific areas.
  • Hacker attack is simulated (Red Teaming)
  • CANCOM is a qualified test center (NISG*)
* NIS audit* NIS audit
02

Protect

Consulting, implementation and operation of enterprise security solutions

  • Cloud Security
  • Network Security
  • Content Security
  • ATP Solutions
  • Application Security
03

Detect

Monitoring the infrastructure and detecting attacks

  • Security Monitoring
  • Compromise Assessment
  • Threat Intelligence
  • Credential Monitoring
04

Respond

Rapid support after cyber attacks

  • Analysis
  • Cleanup
  • Reaction

Learn more about the strategy and approach of the:

Cyber Defense Center (CDC)Cyber Defense Center (CDC)

Your added value

An overall strategy for the benefit of our customers - based on the four security segments Prevent, Protect, Detect and Respond. This covers every security-relevant aspect.

  • Joint development of aholistic security strategy
  • Holisticview of technology, processes and the human factor
  • Prioritization of measures based on business impact analysis
  • Independent consulting with a broad portfolio (McAfee, Microsoft, Cisco etc.)
  • CANCOM employees regularly win international security competitions
  • Experience with every type of attack
  • Threats are detected in real time and combated with the most efficient response
  • Your corporate security is continuously increased, which reduces business risks
  • Company assets are protected
  • Ad-hoc support from cyber defense experts when needed
  • Experienced handling of administrative and legal issues (compliance - GDPR)
GettyImages-926715316-7500x4546-2560x1552

Offense & Defense
Purple Team.

Two powerful teams for strategically and operationally successful cyber security: the RED team and the BLUE team. Together, they pursue the PURPLE strategy with the aim of optimizing the cyber security of companies.

Start nowStart now
we transform for the better

Our cyber security offer for you

The best defense against cybercrime is a holistic security strategy.

Get in touch with usGet in touch with us

For more information security

Cancom is your number one digitalization partner - and as such equips companies with advanced and, above all, secure communication solutions. Customers who decide to work with Cancom in terms of information security benefit from many advantages:

  • Averting economic, strategic and technical damage
  • Protection of valuable data
  • Protection of profitable know-how
  • smooth operation of infrastructures
  • Safeguarding competitiveness
  • Strengthening productivity

Stay safe - even remotely

More people are currently working from home than ever before. This poses major challenges for many companies. It is important not to open the door to attackers into your own company network. This is why a powerful technological infrastructure is not the only key success factor. Secure access to all relevant data and applications for employees is also important - regardless of location and at any time.

Security IoT Industry Scan

More visibility and greater security across different IoT devices for complex OT system landscapes.

Disaster recovery - ransom or data gone?!

Ransomware attacks are on the rise. Protecting your company is becoming increasingly complex. Be better prepared for the worst-case scenario to prevent a standstill.

Blog - 15. November 2022

Two teams, one strategy, one goal: Team RED and Team BLUE in the fight for your cyber security.

Offense and defense: Together we are most successful. At K-Businesscom (KBC), you have two powerful teams at your disposal that are strategically and operationally responsible for successful cyber…

Read the full article

Blog - 9. November 2022

Citrix ADC / NetScaler and Citrix Gateway vulnerability

We would like to inform you about a current security issue with Citrix ADC / NetScaler and Citrix Gateway . Citrix has already provided an update to fix the vulnerability. CVEs : CVE Score …

Read the full article

Blog - 2. November 2022

SOC - Modular security for your company

EDR, SIEM, NSM, USW: Modular security for your company Early detection and rapid action are the keys to successfully defending against cyber attacks. KBC's Security Operation Center (CDC) offers y…

Read the full article

Blog - 18. October 2022

SIEM or SOC? SOC or SIEM? Or both? A short course in innovative cyber security.

In a security incident, there are four crucial questions: What happened? Where and when did it happen? And how did it happen? Answers to these questions come from the SOC and / or SIEM. First the …

Read the full article

Contact
CANCOM Austria

Request now

Under this link you will find our privacy policy.