System hardening workshop

System hardening is an essential component when it comes to endpoint and cyber security. In this workshop, you will learn what is possible and why system hardening has one of the best cost-benefit ratios in cyber security.

  • Choosing the right standard

  • Procedure for introducing system hardening

  • Understanding and usage options for firewalls, application whitelisting, and more

  • That's what we do in the system hardening workshop

    In our workshop, which is tailored to you, we will explain the basics of implementing device hardening in your company according to standards. We give you an overview of which standards exist, how to use them and which weak points they have. We also take a closer look at topics related to application whitelisting, Windows Defender Firewall and secure access with a PAW.

    Der Inhalt des Workshops:

    Learn in our workshop how you can effectively harden your systems by using system hardening standards, application whitelisting, Windows Defender Firewall and Privileged Admin Workstations. Unfortunately, standards and standard configurations always have weak points, which we highlight and mitigate in our workshop. We offer you the flexibility to adapt the workshop content to your specific requirements in order to also cover further and more complex topics of system hardening.

    Use of standards and their limits

    • Overview of system hardening standards (Microsoft, CIS, BSI, etc.)
    • The right choice of standard and for your company
    • Establishment of standards and application
    • Standards' blind spots
    • Process for implementing hardening measures

    Application whitelisting

    • Concept and meaning of application whitelisting
    • Comparing Applocker and Windows Defender Application Control (WDAC)
    • Applying standard policies
    • Known vulnerabilities and how to fix them

    Windows Defender Firewall

    • Concept and meaning of application whitelisting
    • Comparing Applocker and Windows Defender Application Control (WDAC)
    • Applying standard policies
    • Known vulnerabilities and how to fix them

    Privileged Admin Workstation (PAW)

    • Basic concept of PAW and the Tier and Least Privilege Model
    • Hardware vs virtual PAW
    • Special insurance on PAW
    • PAW access to devices and cloud

    Other possible topics, by arrangement

    • Basic concept of PAW and the Tier and Least Privilege Model
    • Hardware vs virtual PAW
    • Special insurance on PAW
    • PAW access to devices and cloud

    Organisatorisches:

    Dauer:
    1 - 3 days
    Preis:
    starting at EUR 1,500 net per day
    Now
    System hardening workshop
    request

    Gemeinsam besprechen wir eure Zielsetzungen, klären die wichtigsten Inhalte und finden den optimalen Termin.

    Über uns

    Nein zu Stillstand, ja zu echtem Impact

    Specialization instead of belly shop

    Anyone who wants competent help goes to a specialist and not to a general practitioner. We don't write down 100 topics on the website that we have to familiarise ourselves with first, but are focused and get you moving forward within a very short period of time. Through our focus, we are able to pursue innovations and incorporate them into our collaboration.

    • Specialized
    • Strong in implementation
    • No trial & error
    • Innovative
    • Service-oriented

    Your reliable partner

    We work with our customers on equal footing, tangible and respectful, as among valued colleagues. At the same time, we are not afraid to express our opinion and recommend against the hype. We also put into practice what we design. In a structured approach along the endpoint strategy.

    • Like a valued team member
    • No stiff customer-service provider feeling
    • plain text
    • Strategists and makers
    • Holistic and structured

    High standards for ourselves and our customers

    This makes working together fun and leads to the goal. We keep our word and make things transparent when we can't do something. Our goal is to constantly move our customers forward and to grow as a team. That is why we also expect our customers to be willing to change and innovate. There is always something to do in our field.

    • Commitment
    • transparency and openness
    • Striving for real impact
    • Joy and pride in finding the best solution for our customers
    • Respect in collaboration

    Companies that want to do endpoint management the right way

    We want to do endpoint management the right way - that's why we work intensively and in partnership with a limited number of customers.

    Our customers usually manage between 500 and 10,000 devices, but up to 70,000.

    But cybersecurity and professional endpoint management are now essential even for smaller companies and can now also be achieved in terms of price.

    That is why we also incorporate best practices from large environments into cooperation with smaller companies with around 100 devices or more.

    • IT departments that want a partner for endpoint management & security
    • Willingness to develop your endpoint strategy
    • From around 100 to several 10,000 devices
    • Enterprise-level endpoint management & security for smaller companies with around 200 devices
    • No industry focus, but plenty of experience in:
    • Energy Providers & Network Operators | Manufacturing Industry | Professional Services | Public & Educational Institutions | Banks & Insurance

    Specializing also means knowing clearly what we are not specialists in

    Incident Response and Security Operations Center

    We are passionate about prevention. If an attack is successful or there is a suspected case, we recommend a 24/7 specialist. Because anyone who promotes 100% safety through prevention is not reputable. In our opinion, prevention and response should involve different responsibilities in order to benefit from each other and to control each other.

    Microsoft 365 tools and business applications

    We make sure that the right version of software is on the right device and that it can be used securely. Others know better how to use this software as productively as possible. This and endpoint management are often combined under “Modern Workplace.” Conversely, you shouldn't let Microsoft Teams experts manage your endpoints.

    Get to know us!

    Customers often describe working with us as if they were working with a valued team member. We are tangible and a trusted companion. With us, there is no trial & error, but plain language. We work holistically and in a structured way and deliver practical solutions that we implement ourselves. But we also know what we can't do.

    #1 in Endpoint Management & Security

    Secure and productive endpoints for our customers have been our passion since 1995

    Founding member
    Business Circle Endpoint Management

    “Thank you for your excellent work during this difficult period of transition. You're really good!”

    Heiko Assmann

    KubusIT