Provider Profile

Grant Thornton AG

Düsseldorf, Germany
1958
1001-10000
GTlogo-CMYK-large-1

About Grant Thornton AG

As one of the 10 largest auditing firms in the world, Grant Thornton offers a wide range of technical and non-technical services. In particular, Grant Thornton provides support in all aspects of cyber security incidents and their handling, including emergency preparedness, crisis communications, data protection and managed security services.

What Differentiates Them From Competitors?

Depending on the client's exact requirements, Grant Thornton can put together customized service packages. We can scale up quickly thanks to our offices worldwide. As auditors, Grant Thornton always provides independent and fact-based advice. Experience with insurers, data protection and investigative authorities as well as in assessing losses from cyber attacks and tracking cryptocurrency round off the profile.

Top Capabilities

Emergency Plans / Exercises
Document emergency plans and conduct crisis exercises.
Endpoint Protection
Technical solutions to protect the endpoints against cyber attacks (e.g. AV, EDR or EPP).
Incident Response Services
Expert services like incident response retainers and forensics.
ISMS / GRC solutions
Solutions and support for information security management systems.
Security Operations Center
Central point for monitoring and ad-hoc response to all security events.

Top Industries

Automotive & Supplier Industry
Construction & Real Estate
Finances & Banking
Healthcare
Utilities & Energy

All Capabilities

Asset Management
GRC (Governance, Risk, Compliance)
ISMS (Information Security Management System)
Legal Counseling
Risk Scoring
Strategy & Advisory
Cloud Security
Data Governance
Data Loss Prevention
Data Protection
eMail Encryption
eMail Security
Endpoint Security
Hardening
MFA (Multi-Factor Authentication)
Mobile Security
Network Security
Patch Management
Secure File Sharing
Security Architecture
Training & Security Awareness
Vulnerability Scanner
Workplace Security
Zone Concept
Anomaly Detection
Detect & Respond
EDR (Endpoint Detection and Response)
Logging
MDR (Managed Detection and Response)
NDR (Network Detection and Response)
Penetration Testing
SIEM (Security Information and Event Management)
Threat Detection
Vulnerability Management
XDR (Extended Detection and Response)
APT-Response (Advanced Persistent Threat)
Forensics
Incident Response
SOC (Security Operations Center)
Backup Solutions
BCM (Business Continuity Management)
Disaster Recovery
No data was found

Provider Contact

Florian_Scheriau_009_A (2)
Florian Scheriau
Partner
Scroll to Top