What is the difference between Managed Services and classic IT support?
Managed Services are proactive: we monitor, optimize, and act before problems arise. Classic support only reacts when something is broken. This saves you downtime and stress.
Answers on managed security operations, FinOps, backup & disaster recovery, Microsoft licence optimisation and 24/7 cloud operations for DACH mid-market companies.
Managed Services are proactive: we monitor, optimize, and act before problems arise. Classic support only reacts when something is broken. This saves you downtime and stress.
Both are possible. You can start with individual services - e.g. only monitoring or backup - and expand as needed. We tailor the offer to your needs.
Our response times are defined in the contract and depend on the criticality. We respond to critical incidents within minutes, not hours.
We analyze your Azure usage and Microsoft licenses, identify savings potential, and implement optimizations. Most clients save 20-30% without loss of functionality.
No, we complement it. Managed Services relieve your team of routine tasks so they can focus on strategic issues. We work as an extension of your team.
If your employees work remotely, use cloud services, or process sensitive data: yes. Zero Trust is not a trend, but the answer to a changed threat landscape.
A Microsoft Defender rollout takes 2-4 weeks. A full Zero Trust implementation with identity, endpoint, and network security takes 3-6 months.
Yes, we accompany you from the gap analysis through implementation to audit preparation. Many of our clients have successfully certified with our support.
If you use our Managed Security Services, we react immediately. We analyze the incident, contain it, and support you in recovery. For everyone else, we offer incident response on demand.
Our focus is on Microsoft Security (Defender, Sentinel, Entra ID) and CrowdStrike. However, we also integrate other solutions if they are already established in your environment.
NIS2 applies to organizations in 18 defined sectors (energy, health, finance, transport, digital services and others) with at least 50 employees or €10 million in annual revenue. Suppliers and service providers to these organizations are also affected. In Germany, the directive is implemented via the NIS2UmsuCG. Many mid-market companies underestimate that they are affected indirectly through supply chains.
NIS2 foresees fines of up to €10 million or 2% of global annual revenue (essential entities), respectively €7 million or 1.4% of revenue (important entities). In addition, management is personally liable for the implementation of security measures.
A complete NIS2 compliance program typically takes 6–12 months: gap analysis 3–4 weeks, prioritized quick wins 2–3 months, structural measures (governance, risk management, incident response, supply chain security) 4–9 months. We focus first on the largest compliance gaps.
Classical security relies on perimeter protection: everything inside the internal network is considered trustworthy. Zero Trust reverses this principle — every access is verified, regardless of location. Based on identity, device state and context. Particularly important for remote work, cloud services and SaaS — where the classical perimeter no longer exists.