Provider Profile

Consist Software Solutions GmbH

Christianspries 4 24159 Kiel, Germany
1982
101-500
Logo Consist mit Umraum RGB

About Consist Software Solutions GmbH

CONSIST Software Solutions GmbH specializes in digital transformation, IT security and managed services. The company's comprehensive range of services and solutions enables IT security for all areas of a company. More than 200 employees not only take care of the conception and integration of the necessary IT architectures, but also of the subsequent support of applications and systems in the managed services. CONSIST has more than 40 years of experience in the market and is present at the locations in Kiel and Frankfurt.

What Differentiates Them From Competitors?

Openness in communication and partnership-based exchange are one reason for the trusting and long-term cooperation with our stakeholders. We do not think in terms of isolated solutions, but take a holistic approach to IT security in order to be effective in the long term. New technologies are incorporated into this when our consultants assess them as resilient changemakers on the market. We act independently of manufacturers and confidently as one of the best providers in the world.

Top Capabilities

Endpoint Protection
Technical solutions to protect the endpoints against cyber attacks (e.g. AV, EDR or EPP).
Identity and Access Managment
Systems and Tools for Managing Access, Indenties and Certificates like IdMs, PKI or authentication Services
IT Asset Management
Inventarization and management of IT assets.
Logging / Monitoring Services
Monitoring of network traffic and activities like SIEM or XDR.
Security Operations Center
Central point for monitoring and ad-hoc response to all security events.

Top Industries

Automotive & Supplier Industry
Defence & Aerospace
Finances & Banking
Trade & Distribution
Utilities & Energy

Provider Content

No references published

All Capabilities

Asset Management
GRC (Governance, Risk, Compliance)
ISMS (Information Security Management System)
Risk Scoring
Application Security
Cloud Security
Data Loss Prevention
Data Protection
Endpoint Security
Hardening
Mobile Security
Network Security
Patch Management
Phishing Tests
Product Security
Remote Access
Remote Maintenance
Secure Data Workflow
Secure File Sharing
Security Architecture
Training & Security Awareness
Vulnerability Scanner
Workplace Security
Zone Concept
Anomaly Detection
Detect & Respond
EDR (Endpoint Detection and Response)
Logging
MDR (Managed Detection and Response)
OT Monitoring
Penetration Testing
SIEM (Security Information and Event Management)
Threat Detection
Vulnerability Management
XDR (Extended Detection and Response)
APT-Response (Advanced Persistent Threat)
Incident Response
SOC (Security Operations Center)
Backup Solutions
Software Implementation

Provider Contact

Bischoff_Katharina_1_8x11
Katharina Bischoff
Portfolio Management

Social Media

Scroll to Top