Bühne Sicherheit

Security

Security plays a key role in the guaranteed operation of all IT solutions and forms the fundamental basis for all areas of Würth Global Services.

Our passion for security is so great that we have developed our own teams with our own services that offer companies additional added value. We do everything we can to ensure that the three protection goals of information security - confidentiality, availability and integrity - are not breached.

 

Benefit from the well-functioning and proven security services of Würth IT.

Data Protection

Data protection

Würth IT assumes the data protection mandate of your company and thus the protection of the individual that he is not impaired in his personal rights by the handling of his personal data.

Würth IT can take on the following tasks:

  • Monitoring of legal compliance
  • Advising management on data protection issues
  • Implementation of data protection impact assessments
  • Preparation and implementation of instructions for relevant groups of people
Certification Body

Certification body

We certify according to ISO/IEC27001:2013 and audit according to international standards. Würth IT is also accredited by the German accreditation body.

If you would like to find out more about the certification body or the certification process, you can find our certification website here: www.ccsec.de

IT-Compliance Checks

IT compliance checks

We carry out IT compliance checks on behalf of Würth Group Internal Audit. The audit is based on ISO 27001. We can also carry out IT compliance checks at your company on request.

Security Operation Center (SOC)

The SOC provides support with all security-related issues and with the elimination of IT security vulnerabilities. It raises employee awareness of security and protection through information or controlled phishing attempts (phishing exercises).

Malicious emails, hacker attacks and malware are analyzed. The Würth IT SOC team also collects central information from various sources in order to identify potential attacks on the IT infrastructure.

Furthermore, IT systems and ongoing analysts are proactively monitored for the current threat situation. This includes technical support. In the event of an acute threat situation or cyber attacks, the SOC team raises the alarm and initiates defensive measures to limit the damage.

SOC