Provider Profile

Consist Software

2021-10-28_neuer Slogan_Master_CMYK

About Consist Software

With 40 years of market experience, Consist is a leading partner when it comes to IT. When we do something, we do it to a high standard and tailored to the needs of our customers. Our experts in the fields of software engineering, legacy applications, data science & AI and security take care of our customers' IT environments. We do this by understanding the actual requirements, advising on a suitable solution and implementing it, through to operation as part of a (full) managed service. In the area of security, for example, we provide world-leading experts for the implementation and support of a SOC (Security Operation Center) with the technology leader Splunk. Consist has been at the forefront of the "Boss of the SOC" - an annual competition organized by Splunk with hundreds of participating companies worldwide - for many years and is also the current title holder.

What Differentiates Them From Competitors?

Many customers are looking for reliable partners with in-depth specialist knowledge in order to receive sound advice and a high-quality service. With 40 years of experience and the know-how of an industry leader, we offer exactly that. We are passionate about innovative and sustainable IT.

Top Capabilities

Endpoint Protection
Technical solutions to protect the endpoints against cyber attacks (e.g. AV, EDR or EPP).
Identity and Access Managment
Systems and Tools for Managing Access, Indenties and Certificates like IdMs, PKI or authentication Services
IT Asset Management
Inventarization and management of IT assets.
Logging / Monitoring Services
Monitoring of network traffic and activities like SIEM or XDR.
Security Operations Center
Central point for monitoring and ad-hoc response to all security events.

Top Industries

Automotive & Supplier Industry
Finances & Banking
Mechanical Engineering
Trade & Distribution
Utilities & Energy

All Capabilities

Asset Management
Certification (ISO 27001, IEC 62443, ...)
Security Consulting
Strategy & Advisory
Data Protection
Endpoint Security
Identity & Access Management
PAM (Privileged Access Management)
Patch Management
Product Security
Remote Maintenance
Secure Code
Secure Data Workflow
Vulnerability Scanner
Workplace Security
Anomaly Detection
Detect & Respond
EDR (Endpoint Detection and Response)
Logging
MDR (Managed Detection and Response)
NDR (Network Detection and Response)
OT Monitoring
SIEM (Security Information and Event Management)
Threat Detection
Vulnerability Management
XDR (Extended Detection and Response)
APT-Response (Advanced Persistent Threat)
Incident Response
SOC (Security Operations Center)
Software Implementation

Provider Contact

pd_contact_avatar_fallback_old_pd
Joscha Sternadel
Portfolio Manager