Apollon Security Consulting Mitarbeiter Apollon Security Consulting Mitarbeiter

Cyber Security Consulting

    Excellent EXPERTISE

    Cyber security Consulting

    From junior SOC analyst to senior vulnerability, pentesting, red teaming, phishing or DLP expert. From SAP Security Consultant to long-time, experienced and Cyber Leader Award winning CISO. Our employees cover almost all areas in cyber security.

    We bring over 100 years of professional hands-on experience to your organization.

    Cyber Security Informationssicherheit Team stark
    Cyber Security Leader Award Gewinner Apollon Security
    Everything from one source

    Cyber Security Operations

    You want (or need) to establish a Security Operations Center (SOC)? Are you considering whether to build it in-house or to outsource it? You have findings from internal or external auditors or even regulators?

    We have extensive expertise in building entire Security Operations Centers (24/7), implementing, customizing and operating the best and most important tools (SIEM, EDR, Email Protection, Phishing, DDoS Protection, Anti-Virus...) in your organization. We define and implement the most efficient processes for your SOC and support you in finding, training and developing appropriate cyber security personnel.

    Furthermore, we define and implement a target operating model for your SOC, which usually includes numerous sub-areas, such as Threat Intelligence, Monitoring & Threat Detection, Engineering, Incident Management, Forensics, Malware Analysis etc.

    Detect and prevent data leakage

    Data Leakage Prevention

    Do you want to detect and prevent sensitive data from leaking out of your company? We have many years of experience in this area and can help you ensure that no data is leaked without your knowledge.

    Whether in conception, vendor selection, planning, implementation or operation, we have done it all and can actively support you in getting a grip on the topic of data leakage prevention.

    KRITIS Kritische Infrastrukturen
    ISMS Information Security Management System

    Cyber Governance, Risk & Compliance

    How are cyber risks most effectively and efficiently controlled, measured, managed, escalated and regularly reported to all necessary stakeholders?

    We understand the challenges in balancing between additional security value and risk acceptance. By experience we provide potential approaches in efficient information security reporting that includes establishing reporting systems, interpreting legal and regulatory requirements and defining as well as building an internal control system.

    Full stack protection for your SAP system

    SAP Security Consulting

    You want to introduce a new SAP system or you already have SAP and want to secure it (even better)?

    We support you in planning, setting up and sustainably securing your SAP systems. This includes an SAP security concepts, manual and automated SAP security vulnerability checks, the detection of security-relevant misconfigurations, detailed and targeted reporting and regular security code analyses.

    §44 Sonderprüfung Bafin IT Prüfung
    When BaFin knocks on the door...

    §44 IT special audit

    What kind of findings are to be expected and in what criticality? Most of all, what kind of consequences follow for the management? From strategy, to analysis, execution, remediation and operations, we can provide you with comprehensive support based on our expertise. We have been through audits and solved all kinds of cases, so we know all the possible pitfalls you may encounter by the banking supervisory authority (BaFin) in special IT audits in accordance with §44 of the German Banking Act (KWG).

    What is the best way to prepare for a 44 audit and how does it proceed? What kind of findings are to be expected and in what criticality, and what consequences can these have for management?

    How do you set up a comprehensive mitigation program to remedy the findings, including regular reporting to BaFin, and how do you find suitable (external) personnel for the remediation?

    Vulnerability Management

    Whether it's setting up your own internal or external vulnerability scanner or configuring a vulnerability scanner perfectly in a way your production environment will not be compromised with every scan, we have exactly the right experience you need to do it.

    We also support you in defining and implementing end-to-end vulnerability management processes, setting up effective reporting or coordinating and mitigating the results of a vulnerability scanner.

    We also find the right personnel and train them in the best possible way for you.

    Vulnerability Management Scanning
    Cyber Security Netzwerk Partner
    Extensively positioned in the field of cyber security

    Numerous other expertise

    Beyond the cyber security theme areas already listed above, we can support you in numerous other topics. These include in particular: Risk Analysis, Penetration Testing, Red Teaming, Incident Management, Training & Awareness, Firewalling, Endpoint Protection, Network Security, Application Security, Data Security, Mail, Web & Mobile Security, Standards and Threat Intelligence.



    Whether you are a small business, a medium-sized company or a major international corporation, whether you are in the public sector, industry, trade, banking, automotive, energy or aviation - our employees have seen (almost) everything and always find the best and most effective measures to bring your company to the desired level of maturity and protect you from cyber attacks.

    IT Sicherheit Großkonzern Erfahrung
    IT-Sicherheit Mittelstand Erfahrung
    Apollon Security SWAT Team
    We are

    Your Cyber SWAT Team

    At Apollon Security there are no lone warriors, but only team players. You benefit from this strong team in the background, both in consulting and in every product & service we develop ourselves.

    Our personnel selection is very strict. Only people who share our mindset and act at the highest professional and human level make it to us.

    Allianz für Cyber-Sicherheit

    Do you have any questions, would you like a callback, or a quote?

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.