Logo links oben (Handshake)
MKO Logo
Logo rechts oben (Laptop)


Many computer (especially private) users make the acquaintance of viruses, trojans, spyware, etc. The attack scenarios extend to a complete takeover of their computer throughout exploiting vulnerabilities. Technical descriptions of security updates often begin with the words "there was a vulnerability discovered which could allow an attacker to take complete control of an affected system..."

A reasonable solution to the pervasive security problems has to be planned thoughtfully against productivity limitations. Our consulting services are introduced in your security policy. E.g. guidelines for the implementation of IT-security at work are based on your security-policy.

  • advice, design and development of your security policy under hardware and software aspects
  • selection and implementation of appropriate security software to protect clients and servers, ongoing maintenance
  • alternative solutions for internal networks running Linux-based applications for specific cases ( "Linux on the desktop")
  • user training especially for security issues
  • vulnerability analysis from external location (simulation of attacks) particularly for servers

Solutions depend heavily on installed software, which is often based on Windows operating systems. From security considerations' point of view the perfect solution (but unflexible) are Linux terminal server environments ( "thin clients"), virtually excluding virus infections.

© 2006 by MKO