Security Checks – focused deep-dive assessments for your most critical areas
Security Checks

Operationalised deep-dive assessments

Security Checks – focused deep-dive assessments for your most critical areas

A defined scope, commissioned on demand, with a report typically delivered within 10 business days. Five checks for the areas where risk tends to concentrate in DACH and EU organisations.

Clarity on real risk

A security check delivers a substantiated risk picture for a clearly delimited area of your IT or compliance landscape. You receive prioritised actions, not a catalogue of findings.

Checks are a pragmatic starting point where a full audit or a multi-week penetration test is not the right format. They can be commissioned in isolation or as the entry to a larger engagement.

Methodologically we work with recognised benchmarks (Microsoft Secure Score, CIS Benchmarks, NIST), our own collection scripts and the operational baseline of consulting and hardening work in regulated environments.

What sets these checks apart from an audit

Defined scope

We do not assess „everything". We focus on the area where risk currently concentrates, with a tier adjusted to your environment.

Prioritised actions

Recommendations written for 30/60/90-day execution, with risk and effort indicated per item.

Engagement on demand

No retainer, no long-term commitment. Follow-on work is your decision after the walkthrough.

Phases

Typical engagement length: 7–10 working days end-to-end.

1½–1 day

Scoping

We adjust the check to your specific environment.

21–3 days

Data collection

Structured collection via prepared scripts, read-only access, or workshops.

32–5 days

Analysis

Evaluation against benchmarks and our operational baseline.

41 day

Report & walkthrough

Delivery with prioritised actions; joint walkthrough.

Report typically within 10 business days after data collection is complete.

Format and engagement

A single point of contact

Throughout the engagement – no account-manager handover.

Read-only access

To the systems in scope. Write permissions are not required.

Commissioned on demand

No retainer, no follow-on obligation. Subsequent work is your decision after the walkthrough.

Operationalised expertise

The checks emerged from consulting and hardening engagements in regulated environments (NIS2, DORA, ISO 27001). They deliver substance, not slides.

Frequently asked questions

How is this different from a pentest?

A penetration test actively probes for exploitable vulnerabilities. A security check evaluates configuration and processes against established benchmarks – without live exploitation, within a defined scope.

How long does a check take?

Report typically within 10 business days after data collection is complete. Total duration depends on how quickly the collection phase can be closed.

What do we receive?

A written report (PDF) with findings, evaluation and prioritised actions, plus a joint walkthrough. Editable formats on request.

Can checks be combined?

Yes. Common combinations are M365 + Defender, Backup + NIS2, and Baseline + Defender. We align the combination during scoping.

Do we need an in-house security team?

No. The checks work equally well for organisations with a dedicated security team and for organisations where security is part of general IT responsibility.

Kontakt aufnehmen

Let's check together whether a security check fits your environment.

A scoping call clarifies scope, the right tier and a workable timeline. No sales pressure, no commitment up front.