Solutions: Architectures

Solutions: Architectures

Information Protection

Secure your business success through the protection of your information

CACOM-Information Protection

Today, contemporary information protection has several tasks: On the one hand, the confidentiality of business-critical and personal data must be guaranteed against hackers, malware, Trojans and phishing attacks. On the other hand, it is the integrity and availability of data that must be ensured at all times.

At the same time, there are a wide variety of governance, risk and compliance requirements. This applies not only to internal guidelines, but also to general data processing in compliance with the law.

To minimize security risks in a targeted manner, you need an IT architecture that constantly adapts to new security challenges and threats. With our CANCOM Information Protection architectures, we secure your information holistically. This enables you to implement your business strategies quickly, efficiently and securely.

Our Information Protection portfolio

Information Protection architectures: From Mobile Security, Cloud Security, Collaboration Security, Big Data Security, Risk & Compliance, Backup and Recovery to High Availability – our field-proven and standardized architectures cover your individual risks.
Analysis for Security & Availability Architectures
  • Information Protection audits – infrastructure, organization & processes
  • Information Protection requirements analysis
  • Information Protection gap analysis
Planning of Information Protection Architectures
  • Architecture design
  • Selection of architecture components
  • Economic feasibility studies
  • Process consulting
  • Control consulting
Design of Information Protection Architectures
  • Project planning & management
  • Installation & configuration
  • Documentation
  • Coaching
Operation of Information Protection Architectures
  • Information Protection support
  • Information Protection operation
  • Information Protection hosting

The information protection architectures are based on ISO 27001, BSI basic protection and IEC 62443 (Industrial Security).

Your added value through Information Protection

Risk minimization through sustainable and individual information protection strategies

Fail-safe thanks to permanently adapted security management

Avoidance of economic damage through preventive measures

Cost efficiency through the use of overall architectures instead of stand-alone solutions

What our customers say


For us, a smooth transition to the new firewall and VPN infrastructure was crucial. Thanks to the competent support of CANCOM Security Consulting, we were able to achieve this goal.

Martin Kugelmann, Information Technology, KUKA Roboter GmbH