Provider Profile

Bechtle AG

Bechtle AG Bechtle Platz 1 74172 Neckarsulm
1983
>10000
bechtle-ag cybersecurity, Endgerätesicherheit Identitäts- und Zugriffsverwaltung ISMS / GRC Lösungen Netzwerksicherheitslösungen Security Operations Center

About Bechtle AG

Bechtle makes it a priority to be close to our customers, with more than 85 system houses as well as e-commerce companies in 14 European countries. Backed by extensive experience and expertise in future-proof IT architecture, we value traditional infrastructures just as highly as current trends like digitalization, cloud computing, modern workplace, security, IoT, KI and IT-as-a-service.

What Differentiates Them From Competitors?

The Bechtle approach is characterized by a high degree of security automation up to the IT operations area, based on SOAR technologies. The incidents can be implemented bi-directionally for technologies with the help of unlimited playbooks. This makes it possible to relieve administrative staff through automated tasks.

Top Capabilities

Endpoint Protection
Technical solutions to protect the endpoints against cyber attacks (e.g. AV, EDR or EPP).
Identity and Access Managment
Systems and Tools for Managing Access, Indenties and Certificates like IdMs, PKI or authentication Services
ISMS / GRC solutions
Solutions and support for information security management systems.
Network Security Solutions
Technical implementation services and solutions like e.g. NAC.
Security Operations Center
Central point for monitoring and ad-hoc response to all security events.

Top Industries

Automotive & Supplier Industry
Finances & Banking
Healthcare
Public Authorities
Utilities & Energy

All Capabilities

Asset Management
Certification (ISO 27001, IEC 62443, ...)
GRC (Governance, Risk, Compliance)
ISMS (Information Security Management System)
Risk Scoring
Security Consulting
Strategy & Advisory
Application Security
Cloud Security
Code Scanner
Data Governance
Data Loss Prevention
Data Protection
Digital Identity
eMail Encryption
eMail Security
Endpoint Security
Hardening
Identity & Access Management
MFA (Multi-Factor Authentication)
Mobile Security
Network Security
PAM (Privileged Access Management)
Patch Management
Phishing Tests
PKI (Public Key Infrastructure)
Product Security
Remote Access
Remote Maintenance
Secure Code
Secure Data Workflow
Secure File Sharing
Security Architecture
Security Testing
SSO (Single Sign-on)
Training & Security Awareness
Vulnerability Scanner
Workplace Security
Zone Concept
Anomaly Detection
Detect & Respond
EDR (Endpoint Detection and Response)
Logging
MDR (Managed Detection and Response)
NDR (Network Detection and Response)
OT Monitoring
Penetration Testing
SIEM (Security Information and Event Management)
Threat Detection
Vulnerability Management
XDR (Extended Detection and Response)
APT-Response (Advanced Persistent Threat)
Forensics
Incident Response
SOC (Security Operations Center)
Backup Infrastructure
Backup Solutions
BCM (Business Continuity Management)
Disaster Recovery
Software Implementation

Provider Contact

pd_contact_avatar_fallback_old_pd
Christian Grusemann
Business Manager Security