We work magic on your IT

Support
  • If you get invited to download the remote support tool by a support employee of Systemfive, please click the link below to download the WINDOWS version of the remote support tool.

    Remote support tool
  • If you get invited to download the remote support tool by a support employee of Systemfive, please click the link below to download the MAC version of the remote support tool.

    Remote support tool
  • Bild
  • Consulting

    We support you in every aspect of IT. We provide advice and support for new acquisitions as well as the optimization of existing IT landscapes.

    Interested in outsourcing your IT platform? 

    Interested in support for your IT architecture or technical support for the optimization of your existing IT platform?

    Then click here for more information:

    IT outsourcing
    IT consulting
  • Highly available

    Systemfive offers not only highly available systems, but also has the expertise required to provide end-users with the IT services they need. An IT system with a redundant structure is not enough. Correct and proactive monitoring and the guarantee of data integrity and security are an integral part of high-availability IT systems.

    You will find more information on this subject here:

    IT security

Security Audit

Guarantee your IT security and let us carry out a security audit. A security audit focuses on the security of the confidentiality and availability of your network systems and (mobile) terminals. The goal is to guarantee control over access to your company network and to implement secure protection against unintentional or intentional manipulations.

Procedure

A security audit is tailored to your requirements and includes the following steps based on the client’s needs:

  • IT inventory
  • Conducting specific tests such as security scans or penetration tests
  • Testing access controls for applications and operating systems
  • Analysis of physical access to the system
  • Staff survey

Our audits comply with international management standards according to ISO/IEC 27001.

Benefits for the client

You will receive a detailed report on completion of the IT security audit. This gives information on the following topics:

  • Test results on the analyses carried out
  • Detailed description of existing gaps in security and weak points
  • Indication of further possible security risks of the current infrastructure
  • Recommendation

On request, we will also be pleased to prepare best practices for quality management in the form of a documentation of your own information security management system.