Cyber security Consulting
From junior SOC analyst to senior vulnerability, pentesting, red teaming, phishing or DLP expert. From SAP Security Consultant to long-time, experienced and Cyber Leader Award winning CISO. Our employees cover almost all areas in cyber security.
We bring over 100 years of professional hands-on experience to your organization.
Cyber Security Operations
You want (or need) to establish a Security Operations Center (SOC)? Are you considering whether to build it in-house or to outsource it? You have findings from internal or external auditors or even regulators?
We have extensive expertise in building entire Security Operations Centers (24/7), implementing, customizing and operating the best and most important tools (SIEM, EDR, Email Protection, Phishing, DDoS Protection, Anti-Virus...) in your organization. We define and implement the most efficient processes for your SOC and support you in finding, training and developing appropriate cyber security personnel.
Furthermore, we define and implement a target operating model for your SOC, which usually includes numerous sub-areas, such as Threat Intelligence, Monitoring & Threat Detection, Engineering, Incident Management, Forensics, Malware Analysis etc.
Data Leakage Prevention
Do you want to detect and prevent sensitive data from leaking out of your company? We have many years of experience in this area and can help you ensure that no data is leaked without your knowledge.
Whether in conception, vendor selection, planning, implementation or operation, we have done it all and can actively support you in getting a grip on the topic of data leakage prevention.
Cyber Governance, Risk & Compliance
How are cyber risks most effectively and efficiently controlled, measured, managed, escalated and regularly reported to all necessary stakeholders?
We understand the challenges in balancing between additional security value and risk acceptance. By experience we provide potential approaches in efficient information security reporting that includes establishing reporting systems, interpreting legal and regulatory requirements and defining as well as building an internal control system.
SAP Security Consulting
You want to introduce a new SAP system or you already have SAP and want to secure it (even better)?
We support you in planning, setting up and sustainably securing your SAP systems. This includes an SAP security concepts, manual and automated SAP security vulnerability checks, the detection of security-relevant misconfigurations, detailed and targeted reporting and regular security code analyses.
§44 IT special audit
What kind of findings are to be expected and in what criticality? Most of all, what kind of consequences follow for the management? From strategy, to analysis, execution, remediation and operations, we can provide you with comprehensive support based on our expertise. We have been through audits and solved all kinds of cases, so we know all the possible pitfalls you may encounter by the banking supervisory authority (BaFin) in special IT audits in accordance with §44 of the German Banking Act (KWG).
What is the best way to prepare for a 44 audit and how does it proceed? What kind of findings are to be expected and in what criticality, and what consequences can these have for management?
How do you set up a comprehensive mitigation program to remedy the findings, including regular reporting to BaFin, and how do you find suitable (external) personnel for the remediation?
Vulnerability Management
Whether it's setting up your own internal or external vulnerability scanner or configuring a vulnerability scanner perfectly in a way your production environment will not be compromised with every scan, we have exactly the right experience you need to do it.
We also support you in defining and implementing end-to-end vulnerability management processes, setting up effective reporting or coordinating and mitigating the results of a vulnerability scanner.
We also find the right personnel and train them in the best possible way for you.
Numerous other expertise
Beyond the cyber security theme areas already listed above, we can support you in numerous other topics. These include in particular: Risk Analysis, Penetration Testing, Red Teaming, Incident Management, Training & Awareness, Firewalling, Endpoint Protection, Network Security, Application Security, Data Security, Mail, Web & Mobile Security, Standards and Threat Intelligence.
OUR EXPERIENCE
Whether you are a small business, a medium-sized company or a major international corporation, whether you are in the public sector, industry, trade, banking, automotive, energy or aviation - our employees have seen (almost) everything and always find the best and most effective measures to bring your company to the desired level of maturity and protect you from cyber attacks.
Your Cyber SWAT Team
At Apollon Security there are no lone warriors, but only team players. You benefit from this strong team in the background, both in consulting and in every product & service we develop ourselves.
Our personnel selection is very strict. Only people who share our mindset and act at the highest professional and human level make it to us.