Engineering office for IT
and publicly appointed expert

IT planning & project management

Planning, installation and documentation according to current standards

Engineering office

WLAN planning and analysis

We plan and evaluate WLAN infrastructures in all project phases – from predictive simulation and on-site site surveys to validation measurements after commissioning. Our measurements are carried out using professional measurement technology and spectrum analysis in the 2.4, 5 and 6 GHz bands. This is how we ensure stable, comprehensive and high-performance radio coverage.

We check existing WLAN environments specifically for faults, performance bottlenecks and optimization potential.

Enterprise network technology

We plan, structure and support the development of complex enterprise networks for companies and public clients. The focus is on client separation, high availability and BSI baseline protection-compliant network architectures that also meet NIS2 requirements. Our concepts are based on modern design principles and take into account current best practices for redundancy, segmentation and operational security.

With over 25 years of practical experience, in-depth “hands-on” know-how and our own IT laboratory, we accompany projects from the concept phase through planning and tendering to implementation and operational support.

Electronic locking systems

We develop and plan electronic locking systems to increase physical security – especially for KRITIS environments. The aim is to replace traditional master key systems with modern, centrally managed and scalable access solutions. Our services include market research, concept development, planning, tendering and project support through to commissioning. This provides operators with a future-proof, economical and audit-proof access organization.

Security architectures and firewall design

We design security architectures in accordance with the requirements of BSI basic protection and the NIS2 guideline. The focus here is on segmentation, multi-level firewall design and the integration of secure authentication procedures.

Our planning also takes into account the current requirements for systems for attack detection (SzA) in accordance with the IT Security Act and the Reporting Obligations Ordinance (BSI-MeldPV), so that operators can meet their legal obligations technically and organizationally.

Server and storage technology

We plan customized server and storage solutions for enterprise environments – from the classic 3-tier approach to hyperconverged infrastructures (HCI) and private cloud operations. Our services include design, planning, tendering, profitability assessment and migration concepts. The goal is a high-performance, scalable and economically viable IT platform.

Risk analysis and safety assessment

We carry out risk analyses to varying degrees – from targeted investigations of individual applications or infrastructure areas to comprehensive risk analyses in accordance with the requirements of the BSI baseline protection compendium and the NIS2 guideline. The aim is to systematically identify technical, organizational and operational risks (gross risk), evaluate them and derive suitable risk mitigation measures (net risk). In doing so, we record both existing vulnerabilities and potential attack paths and assign these to the respective protection requirements. The results are documented in a comprehensible manner and can be transferred directly to management systems such as Verinice. Our risk analyses thus form a reliable basis for security concepts, network segmentation, firewall protection measures and the fulfillment of legal compliance requirements.

IT expert opinions, analyses and hardware investigations

Expert office

Publicly appointed and sworn expert office for IT hardware

As a publicly appointed and sworn expert for information technology, I provide expert opinions on IT systems, hardware components and network infrastructures. The focus is on the investigation of technical defects, damage assessment and the analysis of complex IT structures in the corporate and public authority environment.

Expert reports are prepared for private clients as well as for courts – always documented in a comprehensible, objective and court-proof manner.

Investigations in our own IT laboratory

In our laboratory, we examine IT hardware and mobile devices such as notebooks, tablets and smartphones for damage caused by glass breakage, moisture, pressure or bending. We use precise measurement and analysis technology (including microscopy) to identify causes and document the results in detail. In this way, we create a reliable basis for technical and legal assessments.

Technical analysis of video material

We also carry out technical checks on video files, for example to identify objects, persons or vehicle license plates. Orders in connection with sexual offenses are generally not accepted.

IT SUPPORT FROM A SINGLE SOURCE

SUPPORT FOR

Award procedure

Service description and service specifications including all forms and relevant documents to ensure a complete award file.

Studies and market research

as an introduction and preparation for IT projects

BSI Act / NIS 2

Testing and implementation of requirements in accordance with NIS 2 and the IT Security Act and BSI Act

Risk analysis

For the entire IT and before the construction of a data center according to NIS 2

SOLUTIONS

PREVIOUS CHALLENGES

QUALIFICATION

CERTIFICATES & MEMBERSHIPS