For take-off, please adjust the backrest of your seat into an upright position and fold away the tray tables in front of you! Do not wait until something happens, but remain capable of being able to act. Today IT services are much more than a mere blocking of attacks from the internet through the firewall.

> Gateway Security

CHECK before you jump!

Networks open up many possibilities, but they also carry high risks when configured inadequately or when they lack professional support. Security thus starts at the gateway and ideally already from there protects access by a foreign network. A proper IT security identifies these accesses onto different services and permits it – or simply not!

We support your internet and e-mail security with the help of suitable gateway security solutions. In our portfolio, we join forces with partners that are selected specialists for gateway security.

Show more


Depending on the requirements, our product range offers the following solutions:


Cisco Firewall

Sourcefire and Cisco offer a broad portfolio of cyber security solutions that are customized to meet the intricate threats of today. These technologies complement each other and offer comprehensive protection against the stages of an attack – before, during and after an attack. Next-Generation Firewall (NGFW) by Cisco is focusing on threats and combines everything in a wide-ranging solution: Cisco’s proven Stateful-Inspection-Firewall, application control, Cisco’s Next-Generation Intrusion Prevention System (NGIPS) and Cisco’s Advanced Malware Protection (AMP).


Palo Alto

We offer many services that facilitate the implementation of your firewall. This firewall helps to detect and to defend against even the most cunning cyber-attacks. Palo Alto is based on the control of applications instead of the conventional port control. Nowadays, software, protocols and certainly attackers too are using standard ports, like HTTP port 80, to tunnel their own application through a conventional firewall. Palo Alto Appliances identifies and monitors the user and the content as well as applications regardless of which port is being utilized. Together with content security (anti-virus, anti-spyware, URL filter) and endpoint security, a complete, centralized and high-performance security gateway is established that can be used by local, VPN and SSL users as well as by users with mobile PCs.



Cisco IDS / IPS (Intrusion Detection System / Intrusion Prevention System)

Cisco has an extensive portfolio of security solutions for the changing security needs of consolidated, highly virtualized and cloud based environments. These solutions protect high-performance data centers and mobile work environments even more comprehensively:

  • A highly scalable software for the most frequently used firewall worldwide, Cisco Adaptive Security Appliance (ASA)
  • A virtualized ASA for multi-tenant environments
  • A new Intrusion Prevention System (IPS), that features the highest performance and an efficient application protection in data centers
  • Sourcefire as a multi-stage protection for intrusion prevention


Cisco ESA / WSA (Web Security Appliance / Email Security Appliance)

Cisco IronPort Web Security Appliance (WSA) has been developed for companies of any size and it combines conventional techniques for URL filtering with innovative filters for reputation and malware on a single device. This multi-layered system to prevent threats in conjunction with an exceptionally powerful web proxy ranks amongst the leading solutions for protection from web-based threats. Cisco Email Security Appliance (ESA) is helping to set out the rules accurately. Harmful e-mails can be fought off in several layers or they will at least be defused. ESA, particularly the recently launched version 10, offers possibilities for configuration to ward off spoofing / CEO fraud, malware and other attacks successfully.



Cisco AMP

At the moment, Cisco offers the most current comprehensive portfolio of solutions for Advanced-Malware-Protection (AMP) in the industry. These solutions are characterized by complete transparency and control in the entire extended network – and protection against malware that completely covers the entire stages of an attack, i.e. before, during and after an attack.

Show less

> Identity Security

Trust is good. Data security is better.

Do you know exactly who in your organization has access to which system and which information?

Identity and access management will give you an overview of all access rights in your organization and will help you to manage it. Identity-security solutions will ensure trustworthy identities for people, software and devices – in the physical world as well as in the digital world.

Show more

Depending on the requirements, our product range offers the following solutions:

Microsoft Azure Active Directory
Azure Active Directory (Azure AD) is a comprehensive Cloud solution to administer identity and access and offers a whole range of robust features for the administration of single users as well as groups. With this solution, you can ensure secure access into local and Cloud applications; for instance, Microsoft web services like Office 365 or many Software-as-a-Service (SaaS) applications of other providers.

With the Identity Services Engine (ISE), Cisco offers a solution that allows you to control the access to the network centrally. Here, one can define client requirements and the resulting access rights for Wired LAN, Wireless LAN as well as VPN. Additionally, administrators receive detailed information via ISE as to who and when someone logs onto the network and with which device.


SafeNet solutions for the protection of identity and data by Gemalto offers a comprehensive range of products for encryption, multi-factor authentication and key management. These products guarantee the protection and the ownership of sensitive data throughout the whole lifecycle – when creating, retrieving, sharing, saving and transferring. That way, companies stay completely protected and compliant, all the way from the data center to the Cloud and will stay in full control too – no matter what business they are dealing with.

For quite some time OpenDNS, a solution that can be integrated into the Cisco security portfolio, has been available. This solution is evidently able to combine all requirements with security and this without adding complexity. DNS is responsible when IP addresses have to be figured out behind domain names. Every one of us and essentially all of our devises are using DNS on a daily basis. Without DNS, most of our applications would not be functional at all. OpenDNS offers protection at DNS level that does not depend on the protocol and it provides all the information that was collected in order to give defenders the opportunity to be informed swiftly of the current security status. Here, any desired location and any possible client can be integrated into the security concept – and this with minimal effort.

Show less

The deliberate encryption of data with subsequent blackmailing has unfortunately become common practice.

Thomas Fellinger

Security Penetration Tester, NTS


At some time sometimes is too late.

What is the basis for internet security? Foremost, it is the knowledge of your weaknesses. No technology is 100% secure, but a suitable technological infrastructure allows you to recognize and to control your own weak points. How can you protect your data and how will you be able to remain capable of acting in case of an emergency? Exactly for this, we offer heroic NTS Security Consulting solutions.



A central aspect of data protection is the safety of the data. The EU General Data Protection Regulation has come into effect already and  therefore in-house IT concepts should be scrutinized especially now. It needs to be clarified if they comply with the latest technical and legal requirements.

It is essential to be aware of the current level of protection in order to protect oneself from current threats and to take the necessary preventative measures to minimize the risks. Exactly for this, we have developed two new service products: the NTS Vulnerability Assessment and the NTS Penetration Test. From an IT standpoint, we gladly provide you with concrete recommendations for action and we offer comprehensive consulting.

Cisco Gold Partner
Palo Alto Networks
Microsoft Gold Partner