We create your customized roadmap so that you know who has to do what and when. It allows you to plan budgets and marketing reliably and with the certainty of not forgetting anything.
There is no need to sweat when file reviews are pending – with our experts at your side, you are well-prepared for any audit or review.
With us, creating your cybersecurity file becomes a sprint. That way, you can impress with quick results, and your company will have secure devices that quickly succeed in the market.
Our experienced experts know exactly what authorities and notified bodies expect. They are even involved in writing new standards and co-authored the guideline for notified bodies.
Our more than 100 experts are also available to help you with other topics as needed, such as risk management or the usability of your medical devices.
You benefit from templates that have proven themselves countless times in audits and reviews. That puts you on the safe side and saves time and money.
With the increasing prevalence of connected devices and the use of IT systems in healthcare, cyber-attacks and other IT security incidents are becoming more likely. It's up to the manufacturers to take appropriate preventive measures – a demanding and often overwhelming task.
The topic of IT security is causing headaches for many: There are too many unfamiliar technical terms and too many standards and requirements that are difficult to understand. In addition, there is uncertainty about what authorities and notified bodies actually want to see, which methods and tools are most suitable, and which documents ultimately belong in the cybersecurity file. Where should you even start?
Whether you are looking for an overview, need help with specific tasks quickly, or want to outsource the creation of your cybersecurity file entirely due to a lack of time and resources, we have the right solution.
In our seminars or workshops, our experts will clarify the basics with you:
This overview forms the basis for the next step, jointly creating a concrete project plan. We provide you with our proven templates for successful implementation on your own. Our team is happy to review and answer any open questions after each step.
Through targeted and customized workshops, we help you with the:
Do you still need an information security management system (ISMS) according to ISO 27001? Our team will help you set it up and integrate it with other management systems in your organization.
Learn more
Our IT security experts use targeted pen tests to simulate cyber-attacks on your software-based devices, infrastructures, and/or networks, uncovering security vulnerabilities that hackers could potentially use to gain access.
Learn more
Our team can create all the necessary device-specific documents for you, carry out gap analyses, and correct errors. That way, you will receive compliant approval documents to submit directly.
Even if the authority or notified body has already found deviations or you have concerns, help is available. You can also rely on our support in processing deviation reports.
Contact us now to find the best form of support for your IT security needs.
Exclusive in-house bundle combines regulatory compliance (IEC 81001-5-1) with secure coding. Five-day practical training reduces market access risks and avoids costly audit deviations through in-depth security expertise.
We use cookies on our websites. Some of them are essential, while others help us to improve this website and your experience.
Here you will find an overview of all cookies used. You can give your consent to entire categories or have further information displayed and thus select only certain cookies.
These cookies are needed to let the basic page functionality work correctly.
Show Cookie Information
Hide Cookie Information
Google Tag Manager
Cookie from Google for controlling advanced script and event handling.
| Provider: | Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Ireland |
| Cookiename: | _ga,_gat,_gid |
| Runtime: | 2 Jahre |
| Privacy source url: | https://policies.google.com/privacy?hl=de |
Statistic cookies anonymize your data and use it. These information will help us to learn, how the users are using our website.
Show Cookie Information
Hide Cookie Information
Google Analytics
Tracking and analysis of traffic on our websites.
| Provider: | Google Inc. |
| Cookiename: | ga_*, gi_*, gat_gtag_* |
| Runtime: | 365 |
| Privacy source url: | https://policies.google.com/privacy |
| Host: | google.com |
Matomo
Tracking and analysis of traffic on our websites.
| Provider: | Matomo |
| Cookiename: | pk_ses*, pk_id* |
| Privacy source url: | https://matomo.org/privacy-policy/ |
Hotjar
Tracking visitor behaviour on our websites.
| Provider: | Hotjar |
| Cookiename: | _hjAbsoluteSessionInProgress, _hjSession_1170855, _hjSessionUser_1170855, _hjid, _hjIncludedInSessionSample |
| Runtime: | 1 |
| Privacy source url: | https://www.hotjar.com/legal/policies/privacy/ |
| Host: | hotjar.com |
Marketing cookies from thrid parties will be used to show personal advertisment. They use them to track users outside of their own web page.
Show Cookie Information
Hide Cookie Information
Hubspot
Tracking the identity of a visitor. It is passed on to HubSpot when a form is submitted and is used to deduplicate contacts.
It contains an opaque GUID that represents the current visitor.
In addition, cookies from LinkedIn are introduced for marketing purposes.
| Provider: | Hubspot |
| Cookiename: | hubspotutk, __hssrc, test_cookie, lidc, li_gc, lang, lang, bscookie, bcookie, _gcl_au, __hstc, __hssrc, __hssc ,__cf_bm, UserMatchHistory, AnalyticsSyncHistory |
| Runtime: | 730 |
| Privacy source url: | https://legal.hubspot.com/privacy-policy |
| Host: | .hubspot.com |
Conversion tracking from LinkedIn.
| Provider: | |
| Cookiename: | li_fat_id, li_giant, VID |
| Runtime: | 365 |
| Privacy source url: | https://www.linkedin.com/legal/privacy-policy?trk=content_footer-privacy-policy |
| Host: | .linkedin.com |
Meta
Conversion Tracking from Meta.
| Provider: | Meta |
| Cookiename: | _fbp, _fbc, _fbq |
| Runtime: | 365 |
| Privacy source url: | https://www.facebook.com/privacy/policies/cookies/ |
| Host: | facebook.com |
Content for Videoplatforms und Social Media Platforms will be disabled automaticly. To see content from external sources, you need to enable it in the cookie settings.
Show Cookie Information
Hide Cookie Information
Google Maps
Required to display maps. Google uses cookies here to identify and track users.
| Provider: | |
| Cookiename: | NID |
| Runtime: | 183 |
| Privacy source url: | https://policies.google.com/privacy?hl=de |
| Host: | google.com |
Hubspot Forms
Google Recaptcha for Hubspot forms.
| Provider: | Hubspot |
| Cookiename: | _GRECAPTCHA |
| Runtime: | 180 |
| Privacy source url: | https://policies.google.com/privacy?hl=de&fg=1 |
| Host: | js.hsforms.net |