Mission Statement –
IT-Security & CSIRT Services

hexagon

MH Security Framework

Our mission is to sustainably protect companies from cyber threats through our IT security and CSIRT services, and to respond quickly and effectively in the event of an incident. By combining preventive security measures, proactive threat detection, and professional incident response, we strengthen our customers’ digital resilience.

We identify and close security gaps, detect and analyze advanced threats such as APTs, attacks on web services and OT systems, and ensure that attacks do not go unnoticed. In the event of a cyber incident, our CSIRT (Computer Security Incident Response Team) is ready to take swift and targeted action using specialized experts, state-of-the-art forensic technology, and proven processes.

Our goal is to minimize damage, restore IT infrastructure, and implement lasting security improvements.
Through continuous optimization, knowledge transfer, and collaborative partnerships, we ensure that our customers stay one step ahead – secure, resilient, and well-prepared for the challenges of the digital threat landscape.

Analyze – Protect – Thread – Respond
blank
Analyze

Analyze

Hunt for New Attack Vectors & Assess Existing Security Postures

Our mission in the Analyze domain is to proactively identify both emerging attack methods and existing security vulnerabilities. Through in-depth analysis of customer infrastructures – from Active Directory and firewalls to endpoint and cloud security – we uncover weaknesses and assess potential attack surfaces.
With a forensic perspective on current threat landscapes and innovative research methods, we ensure that security risks are detected early and addressed in a targeted manner. Our goal is to enhance organizational resilience against future cyber threats and to derive effective protective measures.

Lines

Cyber Security Check

The Cyber Security Check offers a structured analysis of a company's IT security situation along the entire value chain. In an interactive 5-hour format, organizational, infrastructural, and technical aspects are examined and evaluated using a traffic light system. The aim is to identify specific vulnerabilities and derive prioritized measures—pragmatically, comprehensibly, and effectively.

hexagon
blank
blank

Protect

Implement Countermeasures for Well-Known Attacks or Malware

Our mission in the Protect domain is to strategically enhance and adapt established security measures to provide organizations with optimal protection against known threats. By implementing robust defense mechanisms across areas such as Active Directory, firewalls, endpoint security, and cloud environments, we minimize attack surfaces and strengthen our customers’ resilience against cyberattacks.
We rely on automated defense strategies, continuous optimization, and industry best practices to proactively counter threats. Our goal is to establish a resilient security architecture that withstands ever-evolving threats and ensures sustainable protection for businesses.

Protect
blank
Lines

Co-Managed Firewall Service

The product bridges the gap between unmanaged firewalls and comprehensive security services such as

  • MDR: The goal is to ensure transparent, audit-proof firewall operation with predictable performance.
  • Managed model: Full operation by us
  • Co-managed model: Shared responsibility with customer IT (access approval & change coordination)
blank

DARKNET MONITORING SERVICE

The Darknet Monitoring Service offers customers external, keyword-based monitoring of relevant sources on the clearnet, deep web, and darknet. The aim is to detect leaks or signs of planned attacks at an early stage before operational damage occurs. Results are provided in the form of alerts and monthly status reports. The product is technically passive (no connection to customer systems) and fully GDPR-compliant.

Lines
Lines

NAC WITH PACKETFENCE

This solution provides a centralized, platform-independent network access control system that protects networks from unauthorized devices and ensures compliance-compliant access management. PacketFence is a proven open-source NAC platform with extensive features for network segmentation, device onboarding, BYOD handling, and integration with existing directory services.

blank

Secureldent

SecureIdent is a highly secure authentication solution based on certificate-based two-factor authentication (2FA) in combination with privileged identity management (PIM). The solution was developed to meet the highest security requirements and is suitable for security-critical environments in business, government, and defense. As a provider, we support companies and government agencies in setting up a multi-level enterprise public key infrastructure (PKI), integrating YubiKey smart cards, and introducing a PIM system.

Lines
blank
Thread

Thread

Find threats, generate incidents

Our mission in the Thread domain is to detect cyber threats in real time and accurately identify security incidents — ranging from traditional attacks to highly sophisticated Advanced Persistent Threats (APTs). Using cutting-edge threat intelligence, anomaly detection, and proactive security analytics, we monitor the entire corporate infrastructure, including Active Directory, firewalls, endpoint security, cloud environments, web services, and OT systems.
Our goal is to reliably detect attack attempts, minimize false positives, and classify critical security incidents with maximum accuracy to enable a fast and effective response. In doing so, we ensure a transparent, resilient, and robust security posture that protects organizations from complex threats.

Lines

SOC Readiness – Consulting & Support for Your Own Security Operations Center

The SOC Readiness Service supports companies in setting up their own Security Operations Center (SOC) – professionally, organizationally, and technically. The aim is to accompany customers on their journey from project launch to stable SOC operation: practical, adaptable, and aligned with standards such as ISO 27001, BSI IT-Grundschutz, or NIST.

blank

MDR Service

Our MDR (Managed Detection & Response) service offers comprehensive protection through continuous threat detection, analysis, and rapid response to security incidents. There are two service levels to choose from—Essential and Advanced—tailored to different protection needs.

Lines
Lines

SOC Service

The SOC service provides our customers with a fully operated Security Operations Center (SOC) – focusing on continuous monitoring of security-related events via a central SIEM system. Based on our MDR service and linked to proven detection use cases, we take care of the operation, analysis, prioritization, and – depending on the agreement – escalation of incidents.

blank

Enterprise log management with Graylog & OpenSearch

This solution provides a scalable and powerful enterprise logging platform that enables centralized log collection, analysis, normalization, alerting, and storage. The system relies on proven open-source technologies:

  • Graylog for processing and analyzing log data
  • OpenSearch as a high-performance search and storage solution
  • Ingress proxy for secure and redundant log acceptance
Lines
hexagon
blank
blank

Respond

Remediate Incident

Our mission in the Respond domain is to support organizations quickly, effectively, and precisely in the event of a security incident. With our mobile response teams, specialized hardware, deep expertise, and established processes, we can respond promptly on-site and professionally handle cyberattacks of any kind — from ransomware and APTs to attacks on web services and OT systems.
Our focus is on rapid containment, forensic analysis, and sustainable remediation of the incident to minimize operational disruptions and prevent future attacks. By working closely with the customer, we develop tailored recovery strategies, optimize security measures, and ensure that the organization emerges stronger from the incident. Our goal is to restore critical business processes as quickly as possible and enhance resilience against future threats.

Respond
blank
Lines

Expert Forensic Service

Expert Forensic Service provides IT forensic support for public authorities with a focus on speed, reliability, and legally compliant evidence preservation. Whether you need specific IT forensic measures, technical advice on IT security, or technical support in the context of investigations, Expert Forensic Service offers fast, professional assistance. Remotely or directly on site. The service is available throughout Germany—24/7, remotely or on-site, and fully GDPR-compliant.

Footer Image