Our strengths – your advantage Expertise you can trust
Your IT security – our expertise: customized, reliable, future-proof.
concentrade
at a glance
Board of Directors:
J. Albrecht, P. Goerdt, H. Dahlhaus
We all protect what is important to us. In IT security, this means safeguarding the infrastructure and the data stored within it. Building and maintaining optimal protection against cyberattacks is the core competency of concentrade. As an independent specialist with over 20 years of experience, we develop tailored security solutions – from analysis and conception to operation.
Our team of certified experts combines technological expertise with deep industry knowledge to make companies of all sizes resilient against threats. We rely on pragmatic approaches that unite security and cost-effectiveness. For us, IT security is not a standard product, but an individual challenge that we tackle together with our clients.
Cybersecurity and Infrastructure Specialist
We connect IT security with infrastructure expertise to make systems resilient against modern cyber threats – from the cloud to the data center.
End-to-End Security Solutions
From analysis to operation: We support you with tailored security solutions that integrate seamlessly.
More than 27 years of experience in IT security
Since 1997, we have been setting standards in the protection of critical infrastructures and dynamically adapting to new risks.
Security by Design
We integrate protective mechanisms right from the design phase – for systems that are secure from the ground up.
Highly qualified and experienced team
Our team combines technological expertise with industry-specific know-how – delivering solutions that are both economically viable and secure.
Multiple certifications, including ISO 27001.
Our processes meet the highest compliance standards and ensure transparent, audit-ready security.
Security Packs by concentrade
Insurance Check
Damage caused by cyber attacks can be immense. Insurers therefore require risk-reducing measures for the conclusion of cyber insurance. What measures should be taken?
NIS2 Advisory
With the NIS2 directive, the legislator aims to strengthen cyber resilience. The new regulation includes significantly more companies. What applies in the individual case?
Security Validation
Our experts assess your company’s IT infrastructure for potential vulnerabilities using controlled attacks and provide detailed insights for optimization possibilities.
Risk Assessment
What is the state of endpoint and Active Directory (AD) security in the company? – Let’s take a look! Endpoints and Active Directory are among the preferred targets for attacks.
External Attack Surface Scan
How do attackers view the company? What information do assets reveal to potential attackers and how could this be used for a cyberattack? The External Attack Surface Scan provides an overview.
O365 Email Threat Analysis
70% of all cyberattacks begin with an email. Our experts test the reliability of your email security solution – in real-time and without any extra effort from you.
BSI Cyber-Risiko-Check
In the workshop, requirements from various areas regarding the security level in the company are reviewed. The result is a report according to BSI standards with action recommendations categorized by urgency.
Darkweb Intel
Automated searches capture and analyze hidden forums and marketplaces. Are compromising data from your company accessible? – Gain more insights through proactive risk assessment.
Here's what our customers say