Be prepared for the worst case scenario – with our provider comparison, you will find the right support for it

  • Price-performance ratio
  • References
  • Competence of the tester
  • Temporal and technical scope

A selection of our 100+ providers

Out value add:

We find the right provider for you in four steps – for free!

 

1

Specify requirements

 

2

Anonymous tender under Bosch brand

 

3

Transparent comparison of top 3 providers

 

4

Provider pitches and customer decision

 
 
 
 

1. We help you to specify your requirements

  • Requirement specification
  • E2E Tendering process
  • Provider validation

Start specification

2. CyberCompare tenders your requirements anonymously

  • Pre-selection based on our market insights
  • Leveraging the CyberCompare database
  • Identification of 5-6 relevant vendor
  • Tendering along the defined criteria

Understand our selection process

3. We provide you with an objective comparison of provider offerings

  • Consolidation of vendor information and preparation of a report with clear recommendations
  • Result presentation of the report
  • Pre-selection of 1-2 favours by customers

View example

4. You make the last decision with our support

  • Favourite providers present themselves in person to the customer
  • Customer makes his final decision
  • Accompaniment of interactions between customer and provider

Book an appointment

Perspective from one of our experts

Dear CIOs/CISOs: Create detailed BCM plans. Create incident management plans. Ensure clean backups and restore processes. Practice and test these processes!

Read the full interview

Daniel Caduff

Deputy Head of ICT

 

Make an appointment and compare provider for Penetration Test – especially for your case!

Contact our expert

 

Simeon Mussler

COO Bosch CyberCompare

+49 (0)711 811-19893

Simeon.Mussler@bosch.com

The development of emergency plans and crisis scenarios ensures the continuation of your business in case of emergency

“Emergency plan
Contingency planning and emergency management are an important part of a security strategy to be prepared for an emergency.
An IT contingency plan typically includes defined processes and documentation for all systems, including fixed and tested recovery points and duration, and is embedded in the company’s overall contingency plans. Topics such as call numbers of relevant persons, composition and competencies of the crisis team as well as communication to e.g. data protection authorities, customers and the public should be taken into account.
The emergency plan is extended to include a restart concept based on the critical systems and in order to minimize the damage to the company as far as possible.
We recommend an exercise with the plans at least once a year.

Crisis exercise with IR provider
An enhancement we recommend is to have an experienced Incidence Response (IR) provider review the contingency plan to determine if the preparation for cyber emergencies is adequate (specifically, if the IR service provider has access to all necessary information that is urgently needed in the event of an emergency). Furthermore, a plan exercise should be run through with this service provider.”