Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

saytec AG of the it-sa 365
default Stage Background
Exhibitor
Manufacturer

Hall 9 - Booth Number 9-245

saytec AG

IT security and proprietary cloud solutions made in Germany

About us

south_east

Floor plan

south_east

Employees

south_east

Products

south_east

Video

south_east

We offer

  • Application security
  • Big data Security
  • Cloud (computing) security
  • Mobile security
  • Network security
  • Storage solutions
  • Web application security
  • Backup solutions
  • Business continuity
  • High availability
  • Remote access (VPN)
  • Access protection
  • Authorities / associations
  • Publications
  • Institutes / initiatives

Industry

  • E-government
  • Financial Sector
  • Industrial IT security
  • Small and medium-sized enterprises
  • Critical Infrastractures
Bremer Straße 11
80807 München
Germany

About us

Increase security, optimize costs and infrastructure

sayTEC offers a holistic NIS-2 compliant security concept for cities, municipalities and companies. It comprises the entire IT infrastructure - consisting of a hyper-converged server structure, storage, backup and a unique Zero Trust Client Access solution for network security. They form three interlocking and interacting security zones. In other words, three vaults in one vault.

The EU-wide security regulations for KRITIS operators will be increased by NIS-2 and will come into force on October 18. They classify around twice as many sectors as critical, increase fines and introduce new IT security obligations - for which the management is liable for breaches.

There is already a draft bill for the implementation of the NIS-2 Directive, which deals with the cyber security of critical infrastructures. Many changes are coming for companies and organizations. The most important of these include:

Expansion of the scope of application:

The number of organizations affected by the regulations is constantly increasing. NIS-2 provides for a significant expansion of the scope of application. The Federal Ministry of the Interior's draft bill suggests that the German legislator will go even further than required by NIS-2.

Governance and directors' and officers' liability:

NIS-2 stipulates that board members, management, etc. should ensure that the implementation of risk management measures is monitored and requires that a breach of this obligation leads to private liability. The draft bill stipulates that the management bodies must fulfill their obligations personally. In addition, they should also be liable to their organization for fines imposed as a result of their breaches of duty. This can have fatal consequences, particularly for board members and managing directors of large companies.

What do all these regulations mean on a technical level, what can be implemented?

How do all these organizations and companies deal with this issue? How should or can companies transfer their existing IT infrastructure to NIS-2-compliant solutions in the short term?

Local authorities, the administration, media and culture are not subject to regulation by the BSIG. Are local authorities, for example, less at risk? Of course not!

1. the demands on the network infrastructure are increasing at an above-average rate. A large number of software and hardware components have to work together, be managed and maintained. This massively increases the complexity, and the administration, acquisition and maintenance costs rise. As a result, vulnerability, security gaps and failures are increasing significantly.

2. the changing world of work. Not only management but also employees are working in the office, on the road and from home. They work with end devices in external networks with locally installed, remotely provided or cloud-based applications. How can all these networks be isolated or work outside of your own network be secured?

3 AI is learning to “walk” and what AI can do today is just the beginning. Cyber criminals are perfecting their methods with the help of AI and can carry out AI-supported attacks.

Maintaining IT security remains difficult. IT managers need to rethink.

Working securely everywhere and maintaining business continuity at the same time involves a great deal of effort - but it is possible!

The holistic and NIS-2 compliant solution from sayTEC AG covers all relevant requirements and reduces complexity by up to 70%. Risks are significantly minimized and an uninterruptible platform for ensuring business continuity is provided.

  ... read more

Floor plan

Employees

show more

Watch our company video

external video thumbnail

Keywords

Backup | Restore | Deasaster Recovery | Holistic Infrastructure | Hyperconverged Infrastructure | Iaas | Saas | Paas | Cloud Computing | NIS2 | VPSC

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.