To the page content
T Business

Magenta Security Assessments & Audits

The increasing complexity of historically developed IT environments poses a challenge. Is your IT security ready to detect current attack patterns?

Security assessments at the technology, process and governance levels.

Effective IT and OT security assessments for a resilient business

Our Magenta IT and OT Security Assessment provides a comprehensive evaluation of your security level. We take into account regulatory requirements such as KRITIS and BSI, market standards such as ISO 27001 and CIS, and frameworks such as NIST. Once the assessment is complete, we derive prioritised recommendations for action based on suitable services and products.

Organisational measures

Confident professional conducts interview with customers
Confident professional conducts interview with customers

Organisational and technical focus

In an initial meeting prior to the assessment, we determine your individual requirements and define the technical scope. We also coordinate the administrative details such as participants, date and location to ensure smooth implementation.

Businessman talking to a customer in the office
Businessman talking to a customer in the office

Assessment of your company’s security situation

Our customised assessment uses a standardised questionnaire tailored to your situation. Through guided interviews and analyses, we gather relevant information about your current maturity level across all security domains.

Two businessmen analysing data in front of a futuristic display
Two businessmen analysing data in front of a futuristic display

Identification of vulnerabilities

Following our assessment, we conduct a gap analysis and evaluate the results in accordance with the relevant standard. For any gaps identified, we document appropriate recommendations for action and present them to you in a separate meeting.

Female project manager at a meeting with her team in an office on the topic of Magenta Security Assessments & Audits
Female project manager at a meeting with her team in an office on the topic of Magenta Security Assessments & Audits

Identify appropriate recommendations for action and prioritisation proposals

The results of the assessment are combined with your requirements and then presented by our consultant in charge. Potential solutions are presented in the form of a prioritised roadmap to increase your organisation's IT security level.

Our security assessments for critical infrastructure and ransomware protection

  • KRITIS Assessment

    The NISG & KRITIS Assessment reviews the implementation of organisational and technical requirements for critical infrastructures, including consideration of essential documentation such as the B3S. A gap analysis is used to identify, prioritise and present the necessary processes and measures.

    Enquire now
  • Red Teaming

    Our Red Teaming Service provides a realistic assessment of your security level by simulating a cyber attack. Your detection and defence mechanisms as well as incident response processes are evaluated by a team of experienced hackers under real-life conditions.

    Enquire now
  • Cyber Security Assessment

    Our IT security assessment analyses your security level in areas such as GRC, cloud, IoT, OT and cyber defence. We follow international norms and standards such as NIST, ISO 27001, BSI and proven telecommunications practices.

    Enquire now
  • Ransomware Assessment

    Our Telekom Security Ransomware Assessment offers a comprehensive analysis of organisational and technical measures. Regardless of the technology used or the manufacturer, we offer security solutions based on international norms, standards and many years of best practice experience in the field of cybersecurity.

    Enquire now

Our security assessments for business continuity, cloud security and risk management

  • Business Continuity Assessment

    Our Business Continuity Assessment (BCA) evaluates the effectiveness of your business continuity measures. Using a high-level Business Impact Analysis (BIA), we analyse business-critical processes and applications to ensure uninterrupted IT operations and smooth recovery.

    Enquire now
  • Cloud Security Assessment

    Our Cloud Security Assessment examines your infrastructure with a general and manufacturer-independent focus. This allows you to benefit from our experience in implementing the cloud strategy within Deutsche Telekom’s own group.

    Enquire now
  • OT Assessment

    Our OT Security Risk Assessment provides you with a comprehensive picture of the risks in your company. We use the results of vulnerability analyses, penetration tests or OT security checks to assess risks and provide targeted recommendations.

    Enquire now
  • ICT minimum standard assessment

    Our assessment, which complies with the Swiss Confederation’s minimum ICT standard, identifies and evaluates the measures implemented in your information security strategy. Based on this evaluation, we create a three-year roadmap with prioritised recommendations for action to reduce risk and optimise costs.

    Enquire now

Our security assessments for AI applications, cyber defence and vulnerability scans

  • AI Security Assessment

    Our AI security experts test your LLM-based applications, such as chatbots and base models, according to the latest research findings. We use both automated and manual testing methods, including tried-and-tested test scenarios, to optimally test and protect your product.

    Enquire now
  • Cyber Defence Assessment

    In our Cyber Defence Assessment, we use best practices and our many years of practical experience to evaluate your existing cyber defence processes and technologies. After the assessment, you will receive a detailed report with prioritised implementation recommendations tailored to your company and your individual threat situation.

    Enquire now
  • Fishing

    Our innovative platform from Telekom Security offers an automated solution for detecting and analysing vulnerabilities in your IT infrastructure. In just a few hours, you will receive a comprehensively analysed website that has been checked for security gaps. This enables us to identify and remedy vulnerabilities at an early stage, support compliance and adapt flexibly to your needs.

    Jetzt anfragen
  • Vulnerability scanning

    With our patented scanning solution – the Offline Scanner Pro – from Telekom Security, you have full control at all times.
    Only you decide when your systems are scanned. This ensures that uncontrollable influences from the scanner can be reliably ruled out.

    Jetzt anfragen

Advice – personalised and tailored to your needs

Do you have any questions? Simply fill out the contact form and we will get back to you as soon as possible. 

Our awards

  • Telekom comes out on top in connect mobile network test
  • Siegel-connect landline test winner 2025 Telekom
  • Gold Partner Microsoft
  • Cisco Gold Partner
  • Zoom Gold Partner