Our Services

IT Security

The increase in the use of technology in all areas of life has also led to a sharp increase in cyber crime. In Industry 4.0 you work in a network and is always available. The data will become part of the core business. In addition to new market opportunities, this change also entails new security risks. Targeted cyber attacks with the goal of getting money or company secrets are increasing rapidly. Akana supports companies and organizations in all industries in implementing a successful IT security strategy. Our experienced consultants also actively support the implementation of IT security measures so that your company is well protected.

Security for companies in the age of Big Data

Industry 4.0 is networked, available at all times and data is becoming part of the core business. This change not only brings new market opportunities, but also increased security risks. Targeted cyber-attacks with the aim of obtaining money or company secrets are increasing rapidly. Whereas in the past it was mainly financial service providers who suffered from attacks, today SMEs, pharmaceutical, transport, utility and service companies are also being targeted.

Depending on the sector of the company, the attackers proceed differently. However, the target can be limited to the following.

  • Data theft
  • Data misuse
  • Manipulation
  • Taking over systems and provoking system failures

Our Know-How

Akana supports you in advising and implementing your cyber security strategy in the following areas:

  • Cyber Security: We advise and support companies with initial assessment, definition of the framework (ISO 27001, NIST, ICT), implementation of standards as well as the evaluation of the existing cyber security strategy.
  • Identity & Access Management: The importance of Identity & Access Management (IAM) is increasing in the cloud sector and in the networking of identities. We evaluate strategies, help with migrations, or implement projects completely. Our goal is to control access and minimise security risks.
  • Web Application Security: The global nature of the internet means that web applications are at high risk of being attacked. Our mission is to protect your application and data from the outside.
  • Cloud Security: In most public or hybrid clouds, the responsibility of the data still lies with you and your company. It is therefore important to protect it with a security concept and measures.
  • Security awareness: One third of all successful attacks are perpetrated via phishing and social engineering. Creating a security culture in the company prevents such attacks and sharpens the perception of risks among employees.
  • Infrastructure security: Half of all attacks occur directly via attacks and exploitation of security risks. We support you, for example, with patching concepts and measures to minimise such risks.

Our Services

Situation analysis

  • IT Security Assessments
  • Digital Risk Assessment
  • Technology Check

Security strategies

  • Cyber Security Framework
  • IT Security Strategies
  • IT Risk Management
  • Cloud Strategie

Planning measures

  • Information Security Management System
  • Policies
  • SOC, IAM, network, cloud concepts
  • Roadmaps
  • Architectur


  • Awareness campaigns
  • Project management
  • Integration
  • Specification


  • Campaign effectiveness
  • Post-implementation validation
  • Security measurements
  • Threat reporting

The corona pandemic has digitized our everyday life. In response to the pandemic and to shape their digital future, companies are increasingly using the advantages of cloud infrastructures such as Amazon Web Service, Microsoft Azure, Google Cloud, Alibaba, IBM or Oracle. But what is a “cloud”? What are the advantages for companies? And what do companies have to consider in the area of security and data protection? An analysis.

Element, WhatsApp, Threema, Signal, Telegram, Vibr, Wickr Me and Wire are not rock bands or fashion labels, they are instant messengers that enable the immediate exchange of text, video or voice messages with one or more recipients over the Internet. Thanks to smartphones, these messengers became extremely popular in a private as well as business context, since they allow data sharing in no time. The announcement of WhatsApp at the beginning of this year that the terms of use will be updated, moved data protection and the security of messengers to the fore. But what does this mean for WhatsApp users? How secure are messengers in general? And how are the messages securely stored and transmitted? This article compares four popular messengers – WhatsApp, Threema, Signal, and Telegram – to answer these questions.[1]-[3]

Identity and access management (IAM) is the discipline to enable the right individuals to access the right IT resources, such as systems applications, files, and networks, at the right time for the right reasons. This often needs to be enabled across diverse technologies and the resulting processes must meet the security policies of the organization. The IAM system is a critical part of IT infrastructure of any larger organization.


Our IT security expert Michael Fedier talks about the 7 steps to take your IT security to the next level and how we do IT security consulting at Akana.

Our way of working has been turned upside down by the corona virus. Companies had to offer their employees the opportunity to work from home in the shortest possible time. It was not only a challenge to provide the necessary infrastructure. Not infrequently, the necessary safety precautions were also neglected. Thanks to the home office, productivity can be maintained as much as possible. But the new way of working is susceptible to hackers who want to profit from the current situation.

Two-factor authentication (2FA) –or multi-factor authentication (MFA) in general – has grown in importance in security in recent years. This is about how users (employees and customers) authenticate to systems. Authentication by username and password is called 1FA. However, in order to increase safety, 2FA or MFA has been increasingly used in recent years.

Share with Others
Share on facebook
Share on twitter
Share on linkedin
Share on xing
Share on pinterest
Share on email
Share on print