Identity & Access Management

  • Identity & Access Management for Cloud and Hybrid Scenarios 
  • Holistic Zero Trust approach 
  • Modern security for Office 365, SaaS applications and legacy applications on-premise 
  • Seamlessly integrate secure remote work scenarios

I am the one who I am - ...sure?!

In cloud or hybrid environments, identity is the key security factor that needs to be protected and managed efficiently. At the same time, there is a need for centralized identity and access management that supports both digital workplace environments, such as Office 365, and all SaaS applications used in the enterprise. In addition, simple access to on-premise (legacy) applications should also be possible.

The focus is on a comprehensive zero-trust approach that is intended to protect the company as well as its employees and customers from cyber attacks.

Our services

Identity Workshop

We present zero-trust approaches based on Microsoft Azure AD and show how to implement them in your company.

Introduction Azure AD

We take over the introduction of Azure AD, from conception to implementation, including the integration of the existing on-premise AD.

Integration of SaaS & on-premise applications

We integrate Azure AD for seamless integration of SaaS and on-premise applications for a unified single sign-on platform.

Identity Governance

We introduce Azure AD Entitlement Services for mapping governance services around your identities.

Zero Trust

We implement Zero Trust concepts with Conditional Access and Azure AD Identity Protection.

Involvement of customers and partners

We implement Azure AD B2B and B2C to seamlessly connect customers and partners to your solutions.

Continuous optimization

We provide ongoing operational support and continuously optimize Identity & Access Management.

New Work, but safely!

The often-used analogy of a moat to protect company networks no longer applies. Because it must actually become more porous to work properly. Particularly flexible work and Cloud technologies require a new security approach. 


What defines us

All facets in view

We have always combined in-depth technological know-how with our expertise in processes and business requirements. With our approach, our customers benefit from high security standards without negatively impacting the user experience.

Awarded Microsoft Partner

As a multiple award-winning Microsoft Partner, including in the area of security, and with over 100 certified employees, we ensure that solutions such as Microsoft Azure AD or Microsoft 365 offer our customers the best possible protection.

Proven experts

Our own consultants are certified in many security areas - whether as ISO 27001 Lead Implementer (PECB), in Microsoft security topics or as data protectionist. We have everyone on board who can meet your different requirements.

Our Cyber Security services

We offer Zero Trust Envisioning Workshops to create an understanding. We take over the development of an individual Zero Trust strategy and implement this Zero Trust strategy and roadmap together with the client.
We advise on general questions in the area of information security as well as on the special requirements of information security in the cloud. The initiation, planning, implementation and documentation of the information security management system is carried out in accordance with ISO 27001.
Whether in the cloud or specific Microsoft environment: We identify areas of action, derive measures, ensure compliance (DSGVO, works council) and support the creation of necessary documentation.
We design and implement threat protection strategies. The technological basis is formed by Microsoft 365 technologies such as Microsoft Defender for Endpoint, Defender for Office, Defender for Identity and Microsoft Defender for Cloud.
We plan and execute automated phishing campaigns, take care of sustainable change management to strengthen cyber security awareness, and ensure employee training and awareness on data protection.

Let us talk about your project

Your personal contact
Ruth Subjetzki

Ruth Subjetzki

Project Inquiries & Account Management

* Mandatory fields