Our complete IT solutions
Modern Managed Workplace
A smoothly functioning IT infrastructure forms the backbone of a modern company. It is therefore important to regularly check and maintain IT systems. Thanks to our Modern Managed Workplace, the security and availability of your IT system are optimized and disruptions or failures are avoided as far as possible. You also receive key figures on utilization trends and efficient support tools.
Our maintenance packages consist of four models – from Bronze to Silver and Gold to Platinum. You can individually determine the anti-virus protection in the model that is suitable for you or your company. To further increase the security of your IT system, you can choose from various options.
Typical challenges
System failures
Security gaps
Insufficient monitoring
Insufficient virus protection
Your advantages
Minimized system failures
Increased security
Comprehensive monitoring
Improved virus protection
Your successes
Stable IT infrastructure
Increased productivity
Scalable solutions
Targeted IT strategy
Weihrich KI
Artificial intelligence (AI) is no longer a vision of the future, but is already a valuable tool for small and
medium-sized companies. Artificial intelligence helps to automate processes, optimize decisions and secure
competitive advantages. Use the possibilities of AI to make your company more efficient and successful!
In a data-driven world, Weihrich AI enables data to be analyzed efficiently and securely at the same time, allowing better, intelligent decisions to be made. With state-of-the-art machine learning algorithms and comprehensive data integration, Weihrich AI offers tailor-made approaches to optimize processes and automate tasks. With flexible application models and a user-friendly interface, Weihrich AI can be seamlessly integrated into your existing systems. The good thing about it:
Weihrich KI offers a secure and regulated solution – company information is not used for training AI platforms.
Typical challenges
Resource connection through repetitive work
Manual evaluation of complex data
Manual evaluation of reports
Your advantages
Automated execution of repetitive tasks
Efficient evaluation of opaque data sets
Customized apps for specific applications
Large selection of language models
Your successes
No unnecessary commitment of resources
More efficient, cost-effective and flexible working
Increasing competitiveness
Security package with analysis scan
The IT infrastructure is now one of the most important factors in ensuring the operation and continuous development of any company.
Are your systems state of the art? Existing infrastructures can be operated sensibly if the current status has been brought up to the latest state of the art through technical and organizational measures and the possibilities of protection systems, which are regularly supplemented by updates, are exhausted.
Over the last two years, there has been enormous development in the area of cyber security measures. These measures prevent threats or mitigate their consequences. We therefore recommend that you analyze your IT infrastructure very carefully in terms of cyber security. During this analysis, we examine your entire network, including all devices involved, for vulnerabilities. Organizational processes that support your company’s IT security are also part of the analysis. On the basis of the subsequent report, consisting of the findings of the analysis and our recommendations for optimizing the current status, we will discuss with you the measures required and, if desired, implement them.
Typical challenges
Updating the systems
Cyber security measures
IT security guidelines
Access control
Your advantages
Vulnerability analysis
Improved IT security
Network security
Detailed report
Your successes
Keeping systems up to date
Closing security gaps
Improve cyber security
Risk reduction
Flexible IT emergency system
A stable IT infrastructure is the backbone of a modern company. Our flexible IT emergency system ensures that your IT functions smoothly even in the event of unexpected outages or planned maintenance or project work.
In addition, our ready-to-use IT emergency system offers flexible deployment options, whether for bridging peak loads, as a temporary test environment for new applications or to support migrations and upgrades. You can rely on our expertise to make your IT infrastructure robust and future-proof.
Hardware specifications:
- 2 x DL380 servers: 2 socket CPU; 192 and 384 GB RAM; 2.7 and 8.5 TB internal disk
- iSCSI NAS: 24 TB storage capacity
- SAS Storage: 40 TB storage capacity
- Network: Multi 10Gbit connections
- Management: Integrated remote tools and iLO
Typical challenges
System failures
System restores
Emergency operation
Migrations
Restore tests
Temporarily required additional resources
Your advantages
Minimized system failures
Increased security
Efficient resource planning
Your successes
Stable IT infrastructure
Increased productivity
Scalable solutions
Targeted IT strategy
Awareness training
User error – no thanks! In modern IT infrastructures, users are the biggest security risk today – through carelessness or ignorance. Increase the security of your IT systems through targeted, ongoing awareness-raising and training of your employees on the subject of threats from the network. Weihrich Informatik offers a SaaS solution specializing in IT security – cost-effective and configured according to your needs, with an intuitive online training and education environment. Give your employees the tools they need to act correctly and in a security-relevant manner. The special feature here is that the software used simulates all attack situations, whether phishing, ransomware, malware or the danger of portable media. You keep your employees’ security awareness permanently high through recurring training. At the same time, you test your IT infrastructure for potential damage. Interested in increasing IT security? Then contact us right now!
Typical challenges
User error
Phishing attacks
Malware
Human weaknesses
Your advantages
SaaS solution
Simulated attack situations
Varied training courses
Comprehensible key figures
Your successes
Increased IT security
Sensitized employees
Prevention of cyber attacks
Measurable safety awareness
Penetration testing
In an increasingly networked world, the security of IT systems is of crucial importance. Penetration testing provides a systematic review of your IT infrastructure to identify vulnerabilities before they can be exploited by attackers. With our comprehensive penetration tests, we simulate targeted attacks on your systems to identify security gaps and recommend measures to improve the security situation.
Our penetration testing services offer customized solutions for your specific requirements – from external tests to comprehensive internal analyses. You receive detailed reports on any vulnerabilities found and specific recommendations for improving your IT security so that your systems are protected against cyber attacks in the future.
Typical challenges
Identification of potential weak points
Maintaining test accuracy in constantly changing IT environments
Minimizing the impact on the live system during testing
Regular review of new attack methods
Your advantages
Increasing safety through targeted remedial efforts
Continuous optimization of security through regular tests
Your successes
Successful identification and elimination of critical vulnerabilities
Improving the overall security situation
Proof of elimination of weak points helpful as a CIP measure, e.g. for ISO audits
Incident Response
In the event of a security incident, quick and targeted action is crucial to minimize damage and restore the affected systems. Our incident response services offer you support in responding immediately to cyber attacks, data theft or system failures. Using a structured approach, we analyze the incident, isolate affected systems and take measures to bring the situation under control.
By combining technical expertise and proven processes, our incident response team helps to prevent further damage and quickly restore your company’s IT security. Rely on our experience to effectively protect your systems in an emergency and prevent future incidents.
Typical challenges
Rapid identification and response to security incidents
Coordination between different teams and departments
Ensuring full recovery after an incident
Identification of the cause and prevention of future incidents
Your advantages
Minimization of financial damage through efficient measures
Preparation of detailed incident reports to optimize prevention
Your successes
Successful handling of security incidents
Shortening the response time
Development of a robust incident response plan
Swiss E-Mail Security with Sign
The secure transmission of emails is essential in today’s business world. Swiss E-Mail Security with Sign ensures that your e-mails are not only encrypted, but also digitally signed to guarantee the authenticity and integrity of the messages. This protects your communication from tampering and unauthorized access while meeting the highest data protection and compliance requirements.
With Swiss E-Mail Security with Sign, you get a comprehensive solution for securing your e-mail communication that can be easily integrated into existing IT infrastructures. Trust in proven security and ensure the protection of your sensitive data.
Typical challenges
Spam
Phishing
Viruses in mails/attachments
Signing
Your advantages
Trained staff check the mails
Connection to networks
Your successes
Significant decrease in spam mails
Outgoing mails (e.g. with a hacked account) are also blocked
Signing by certificate for hundreds of users
Secure Edge
As workplaces and applications increasingly move to the cloud, protecting your network is becoming more complex. Barracuda Secure Edge provides a holistic solution to securely connect and protect your users, devices and applications in distributed locations. With integrated Zero Trust Network Access (ZTNA), firewall functionalities and secure SD-WAN, Secure Edge ensures access to applications and data, regardless of where your employees are located.
Barracuda Secure Edge allows you to centrally manage and enforce security policies while ensuring optimal network performance. Protect your network from modern threats and ensure a secure, seamless connection for your remote and cloud environments.
Typical challenges
Securing the network edges with increasing use of IoT devices
Integration of remote workstations into the company network
Compliance with data protection regulations
Scaling network security with growing traffic
Your advantages
Comprehensive protection for decentralized networks
Scalable solutions for growing network environments
Support for zero trust network access
Simple administration and provision of security policies
Your successes
Securing remote endpoints
Reduction of network violations
Visibility with regard to the security of your web application
Reduction of false alarms
Web Application Firewall
Web application protection is essential in today’s digital landscape. The Barracuda Web Application Firewall provides comprehensive protection against threats such as SQL injections, cross-site scripting and DDoS attacks. It protects your web applications and APIs from known and unknown vulnerabilities without compromising performance or user experience.
With advanced threat detection, automatic attack detection and integrated security updates, the Barracuda Web Application Firewall ensures that your web applications are continuously protected against new threats. At the same time, it offers full transparency and control over your security settings so that you can ensure the highest security standards at all times.
Typical challenges
Protection against a wide range of web attacks
Ensuring application availability with high traffic
Defense against DDoS attacks
Regular updates and adjustments to the safety rules
Your advantages
Complete OWASP Top 10 coverage
Integration into our XDR platform
Unlimited DDoS protection included
Simple administration and continuous updates
Your successes
Defense against web attacks
Improving application performance and availability
Visibility with regard to the security of your web application
Reduction of false alarms
Managed Microsoft 365
Microsoft 365 with all its services (Teams, Office, Exchange, etc.) is now a central, important part of the corporate infrastructure at many companies. The various editions of Microsoft 365 cover almost all modern communication and collaboration needs.
Weihrich Informatik now offers a cost-optimized overall package that includes all proven Office functions, including all security functions required in today’s modern business environment. This includes regular data backups and a comprehensive protection concept including extended SPAM filtering.
That’s why we recommend our “Managed Microsoft 365”. With this complete package, we administer your entire Microsoft 365 environment and use additional tools to ensure that you are optimally protected against email threats, account takeovers and data loss at all times. This not only increases the security of your IT system, but also enables you to work efficiently with the booked applications at all times.
Typical challenges
Email threats
Data loss
Protection concept
Communication and collaboration
Your advantages
Complete package
Regular data backup
Modern safety functions
Efficient collaboration
Your successes
Continuous improvement
Minimize data loss
Maximum security
Seamless communication
Individual solutions for your company
Discover our customized services that are tailored to your specific needs and those of your employees. We offer a wide range of solutions, including training courses, strategy packages, investment packages, communication packages, update packages and data packages. Let our experts advise you and optimize your IT infrastructure, communication costs and investment planning to increase the efficiency of your company.