We Offer

Built-in Quality: We help our clients to utilize IT as a business enabler. Built-in Security: Cyber-attacks are massively increasing in terms of events, affected businesses and damage. So, it is not the question IF but how EFFECTIVE your DEFENSE is and, how EFFICIENT your recovery works in case of a successful attack. As cyber technologies emerge with paradigm shifts through artificial intelligence and upcoming quantum computing, so defense need to scale up as well!

Resilience by Design (RbD): Following best frameworks such as Cobit 5.0, ISO and ISACA standards and working with proven high-performing technologies (though we are independent of software/hardware vendors), we enable your business to stand robust and recover quickly in case of critical events. Business-driven IT system architecture: Depending on the client’s current situation, a clear business intent, benefit hypotheses and acceptance criteria will be formulated, the system architecture aligned to meet current and future needs, and implementation e.g., in terms of software development, integration, deployments and finally release management will be provided as required. That could encompass application development, system configuration (e.g. utilizing tools from incumbent. we also provide Cost savings through smart system retirements

IT System Design

As an IT consultancy with a strong expert network, and member of leading IT standard setters, we offer businesses a single point of contact for all their computer and networking technology needs.
We offer the expertise and service levels coming with a rationale cost structure that makes sense for companies of all sizes. 

Application Examples on SAP (R3)-Installations:

  • >40% of applications in SAP-systems are in-house developments, though only 60% of which are used. This results in high costs (Capex and Opex), additional complexity (interfaces), and vulnerability at new SAP releases (if possible at all, think about S4H!).

>70% of the SAP standards readily available are not used, although >30% of the inhouse developments can be replaced by SAP standard solutions right away. Resulting in reduced process efficiency and low productivity.

How does it work?

Depending on your needs and your own capabilities, we will provide you a support concept that fit neatly into your approach. It may comprise just specific change management interventions or up to full implementation of organizational cyber security implementation which typically comprises

  1. Baselining of specific issues (e.g., how well are IT-Security policies implemented) right up to a full IT audit
  2. Identifying improvement measures (may include trainings, coachings)
  3. Implementing improvement measures
  4. Coaching
  5. Effectiveness check

For higher efficiency, we suggest an agile working mode with biweekly client-participating reviews on predefined deliverables and flexible agile contract. This enables quick feedback and adjustments as necessary.

cropped-Canadian-logo.jpg