Achieving a goal means taking the right path.

Information security involves all processes and functions in your organization. This complexity has implications for your business plans. Thanks to many years of project experience, across a large range of sectors and environments, Redguard consultants understand the multifaceted interfaces between business processes and information security management and expertly support you in information security, from conception to implementation. With our knowledge, experience and exceptional specialist and methodological competencies we ensure your security projects will be fully successful.

Alexander Hermann

Alexander Hermann

Managing Partner
Questions? Contact us

Services

We support you from requirements specification to certification.

ISMS is a definition of procedures and rules within your company. These serve to define information security indefinitely, and to steer, control, maintain and continuously improve your information security. We support you in the conception, building up and further development of your ISMS. We do this according to the established standards of the ISO/IEC 2700x series.

The minimum ICT standard provides a comprehensive approach to secure your organization against cyber risks.

We are happy to support you in determining the maturity level of your organization. By determining the status quo according to the minimum ICT standard, we evaluate whether you already comply with the minimum requirements or whether there are still deficiencies. For the latter, we develop a pragmatic implementation plan that allows you to establish a security process in your organization and thereby maintain the minimum ICT standard in the long term.

Factsheet "IKT Minimalstandard" (German)

We help create the basis for your future-oriented security strategy.

A secure ICT infrastructure is the basis for the future of your organization and can reliably protect your sensitive, company-relevant assets. We support you in the development of your security strategy to create the foundation for a secure future. Together with your specialists we develop the directions, specifications, guidelines and concepts in various areas.

We offer the appropriate support for secure payments processing.

«Payment Card Industry Data Security Standards» (PCI-DSS) are security standards applied worldwide by leading international credit card organizations. We support and accompany your company to achieve PCI-DSS certification: during the concept phase, in the definition of the technical architecture, and up to and including correct implementation.

Let us provide you with a second opinion.

We check and evaluate existing security guidelines or security-relevant workflows and processes (e.g., concepts, technical architectures, etc.)

We evaluate manufacturers and products objectively and independently.

Thanks to many years experience with a variety of manufacturers, products and infrastructures we can optimally support you in your procurement projects. We have all of the required competencies to support you in the evaluation of security solutions. Our independence vis-à-vis all providers guarantees we will find the ideal solution for you. We respectfully recommend you take advantage of our know-how.

As highly competent security consultants we can accompany and support you according to your specific requirements.

As a leading Swiss provider we can manage and support your information security. We ensure that all relevant security aspects are taken into account in a sustainable way, across the entire project lifecycle. In your projects we can operate as an active project manager, project employee or on a mandate basis as a Security Officer. We support you and your company on an organizational security level so you are able to achieve your business goals.

We support you right from the start.

Application security depends in a major way on the maturity of the development process. As consultants and coaches we can support you to ensure that from the beginning of a project, and along the entire development process, security aspects are systematically taken into account. We do this according to the established standard, Microsoft Security Development Lifecycle (SDL).