Software Scripting & Deployment
Cloud management with Microsoft Endpoint Manager, Intune and SCCM
Cloud security on all endpoints and for all devices
Test automation and scripting
Automated software, update and app distribution
Carrying out requirements analyses, proof of concepts and quality assurances
Cloud-based App Development
Development of cloud-based apps
Cloud development with different technologies (e.g. .NET, Java, Python, Node.js etc.)
Integration of best practice tools (e.g. Azure, Visual Studio, GitHub, PowerApps etc.)
Creation of cloud-native applications
Integration, hosting and follow-up support
Integration and Migration of Cloud-based Software
Design, conception and implementation of cloud software (e.g. Microsoft 365, Google Workspace, Slack etc.)
Cross-vendor migration of cloud software (e.g. Exchange, SharePoint, Teams, Google Workspace etc.)
Implementation of cloud-based Software as a Service (SaaS) solutions
Location-independent access to all data in the cloud
Login and access from all devices


Tool Development
Design, development and planning of small business applications
Software development using various technologies (e.g. Java, C#, C++ etc.)
Quality assurance and testing
Agile project management
Technical documentation and follow-up support
Web Development
Web and mobile based software development
Frontend and backend development
Web development using various technologies (e.g. HTML5, CSS, Java, C#, C++, JavaScript, SQL, PHP etc.)
Preparation of technical documentation
Integration, hosting and follow-up support
App Development
App development and programming
UI and UX design
Crossplatform development
Individual adaptability and quality assurance
Integration, hosting and follow-up support


Cyber Attack Simulation & Penetration Testing
Checking the existing IT infrastructure for potential vulnerabilities that could provide an attack surface for potential cyber attacks
External penetration test to simulate “classic” outside cyber attacks
Internal penetration test to simulate cyber attacks with existing access to the internal company network
Identification of weaknesses in existing IT security
Summary of the results and all weak points found as well as recommendations for action for optimisation
Red Teaming and Threat Simulation
Simulation of cyber attacks using different methods
Identification of the resilience of individual business areas
Elaboration of defence scenarios
Optimisation of internal monitoring systems
Early detection of potential cyber attacks