We support you during the implementation of your business strategy. From the actual state towards your goal. Based on your requirements, vision and IT framework
Tactical manoeuvers together with IT operations and IT strategy form the IT management. Our service portfolio ranges from the adoption of KPI-supported reporting to disaster recovery processes.
Advanced persistent threats are complex, industrialized projects with sponsors, a project team, a budget, a timeline and a plan. So Information Security is not a coincidence. It is also a complex project with sponsors, a project team, a budget, timelines and a plan.
Excellence in execution
Information Security Management
Enterprise Open Systems (EOS) is a highly specialized IT consulting boutique with a focus on information security management.
In this sensitive context, we make important contributions to our partners in the design of their IT strategy and tactics in order to achieve their security goals with certainty.
We are active across all industries, but have excellent experience in financial services, insurance, pharmaceuticals, chemicals and cloud providers.
Our employees have decades of expertise in the various aspects of IT security and are recognized experts with various certifications.
Technologies and Services for your Data Center
Value Added for your Business
Enterprise Open Systems supports customers through KnowHow, Experience and Passion.
Protection Goals: CIA and CIAA Management Summary The traditional protection goals of information security are confidentiality, integrity and availability. These three protection goals are often referred to as the CIA triad (owing to the initial letter of the respective goals). Meanwhile, another protection goal has gained in importance. First mentioned by the BSI as a[…]
Supervisory Requirements for IT in Insurance Companies (VAIT) Management Summary The Federal Financial Supervisory Authority (BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht)) has formulated clear expectations for the management and organisation of the IT of insurance companies in the form of the Supervisory Requirements for IT in Insurance Companies (VAIT (Versicherungsaufsichtliche Anforderungen an die IT )). On the[…]
Direct Flash: The new generation of flash memory Flash devices allow companies to provide fast storage on-premises. This can be particularly helpful for hybrid architectures. Processes that require low latency and high bandwidth are hosted locally using flash memory. Less demanding applications – including “cold” data sets – are migrated to the cloud. Pure Storage[…]
IT budget for Cloud Computing Anyone wishing to expand their IT infrastructure with cloud resources – be it in the form of a private, public or hybrid cloud – quickly realizes that this shift requires a re-orientation of the IT budget – especially the evaluation of cloud computing. Cloud services cost accounting follows different rules[…]
Azure File Sync Up to now, many hybrid cloud scenarios have been acceptable at best. With Azure File Sync, Microsoft presents what is a milestone and paves the way for File Services into the world of hybrid clouds. Reading time: 12 minutes. With File Sync, cloud storage does not play the role of a storage component[…]
Containers and Docker – What are they anyway? Starting with the development community, the terms Mircoservices, Containers and Dockers are spilling through the IT world. We try to provide an understandable, abstract overview for IT management. Reading time 10 minutes. When we speak of the three terms above, we find ourselves in the domain of[…]
10 Points Plan against Ransomware You have heard about Cryptolocker Infection over the news? In this article you can learn more about this type of malware and receive tips and suggestions on how to protect your company against Ransomware. Reading time 5 minutes. What is Ransomware? Over the past few years, we have witnessed the[…]
In an increasingly interconnected world where societies depend on digital infrastructure, cyber security is becoming increasingly relevant. The fact that data breaches are becoming increasingly frequent and hacker attacks on power suppliers are successful shows the impact that insufficient cyber security can cause. In this glossary you will find a condensed overview of the most[…]
The Cloud World Market Leaders Cloud Services are ubiquitous, and two companies in particular were able to build a name for themselves: Microsoft Azure and Amazon Web Services. If you want to know how the two vendors differ and which one fits you best, this article will provide you with everything you need to know. Reading[…]
Roadmap Cloud Author: Carsten Reffgen The introduction of new technologies is always a challenge as much as a risk for IT executives. With cloud computing there are additional issues as cloud computing changes processes and the collaboration with other departments. In the following, we provide an overview and suggestions as to which subjects fall in[…]