
Operationalised deep-dive assessments
Security Checks – focused deep-dive assessments for your most critical areas
A defined scope, commissioned on demand, with a report typically delivered within 10 business days. Five checks for the areas where risk tends to concentrate in DACH and EU organisations.
Clarity on real risk
A security check delivers a substantiated risk picture for a clearly delimited area of your IT or compliance landscape. You receive prioritised actions, not a catalogue of findings.
Checks are a pragmatic starting point where a full audit or a multi-week penetration test is not the right format. They can be commissioned in isolation or as the entry to a larger engagement.
Methodologically we work with recognised benchmarks (Microsoft Secure Score, CIS Benchmarks, NIST), our own collection scripts and the operational baseline of consulting and hardening work in regulated environments.
What sets these checks apart from an audit
Defined scope
We do not assess „everything". We focus on the area where risk currently concentrates, with a tier adjusted to your environment.
Prioritised actions
Recommendations written for 30/60/90-day execution, with risk and effort indicated per item.
Engagement on demand
No retainer, no long-term commitment. Follow-on work is your decision after the walkthrough.
Available checks
Transparent pricing, defined deliverables.
from €3,900Microsoft 365 Security Check
In-depth assessment of your M365 tenant security.
- Entra ID & CA review
- Defender baseline
- Exchange & Purview
from €3,900Backup & Recovery Check
Resilience of your recovery capability.
- 3-2-1 coverage
- restore feasibility
- immutability
from €2,900NIS2 Quick Check
Structured readiness assessment against the core NIS2 requirement areas.
- Readiness indication
- Top-10 gap view
- Action path
from €3,900Security Baseline Check
Continuous detection of security-critical configuration drift.
- Continuous Hardening
- Drift detection
- Risk-based prioritisation
In preparation
Defender Exposure Review
from €3,900Effectiveness of your Defender configuration.
Get in touch if one of these checks is already relevant to your situation – we can scope it individually.
Phases
Typical engagement length: 7–10 working days end-to-end.
Scoping
We adjust the check to your specific environment.
Data collection
Structured collection via prepared scripts, read-only access, or workshops.
Analysis
Evaluation against benchmarks and our operational baseline.
Report & walkthrough
Delivery with prioritised actions; joint walkthrough.
Report typically within 10 business days after data collection is complete.
Format and engagement
A single point of contact
Throughout the engagement – no account-manager handover.
Read-only access
To the systems in scope. Write permissions are not required.
Commissioned on demand
No retainer, no follow-on obligation. Subsequent work is your decision after the walkthrough.
Operationalised expertise
The checks emerged from consulting and hardening engagements in regulated environments (NIS2, DORA, ISO 27001). They deliver substance, not slides.
Frequently asked questions
How is this different from a pentest?
A penetration test actively probes for exploitable vulnerabilities. A security check evaluates configuration and processes against established benchmarks – without live exploitation, within a defined scope.
How long does a check take?
Report typically within 10 business days after data collection is complete. Total duration depends on how quickly the collection phase can be closed.
What do we receive?
A written report (PDF) with findings, evaluation and prioritised actions, plus a joint walkthrough. Editable formats on request.
Can checks be combined?
Yes. Common combinations are M365 + Defender, Backup + NIS2, and Baseline + Defender. We align the combination during scoping.
Do we need an in-house security team?
No. The checks work equally well for organisations with a dedicated security team and for organisations where security is part of general IT responsibility.
Kontakt aufnehmen
Let's check together whether a security check fits your environment.
A scoping call clarifies scope, the right tier and a workable timeline. No sales pressure, no commitment up front.