IT solutions
by people
for people


Software

Software architecture and development

Security

IT security consulting

Systems

Setup and operation of IT infrastructure


Security

Information security and data protection are among our core values: these are never fixed end-states — rather they require a practiced process and continuous improvement. Our mission is to enable you to make well-informed decisions, understand security risks and focus your resources where they can have the greatest impact on your security.

In order to achieve the most for you, we bring together a team of many experts in this field and are also in active exchange with other security companies.

Enabling you to focus on what you like to do by taking the work out of IT security is our passion and includes:

The goals here are:

You will be able to practice solid, process-oriented information security at all levels of your organization.

To tackle your challenges together and to actively support you as a long-term partner in the implementation of processes and frameworks, the milestone of which can be one of the relevant information security certifications.

To provide you with a diverse team of highly qualified specialists in order to make a profound contribution in all relevant areas for you.

Management frameworks and certifications in which we have particularly in-depth implementation experience include ISO 27000+, BSI IT baseline protection, C5, TISAX and PCI DSS.

You benefit from our many years of experience with comprehensive penetration testing of a wide range of customer systems and applications, solid testing methodology and customer reporting designed to generate a lot of value for you.

Procedure: Our security experts simulate the activities of a potential attacker, paying particular attention to identifying vulnerabilities that cannot be automatically detected by scanning tools.

You receive meaningful reports based on industry best practices that determine your company's information security level and provide specific recommendations for addressing any gaps found. All with the aim of ensuring the highest operational benefit for you.

Would you like to understand the current security situation in your organization? With a security audit, you can have the areas of your organization examined in breadth and get a well-founded holistic overview of the security level, security needs, sensible measures and important identified risks.

You can expect a Port Zero team with experts in code and infrastructure security to provide you with the best possible support in every area. We are happy to help you introduce and consolidate workable security routines in your products, as well as conduct compliance audits as part of security certifications and due diligence procedures in M&A scenarios, where you receive an inventory analysis and assessment of the actual performance and effectiveness of an organization's information security operations.

Do you take your customers' data and data protection seriously? Is it important for you to be compliant with the General Data Protection Regulation (GDPR) and to actually protect your customers' data in the best possible way?

Fantastic! We are happy to support you on your way through the legal and technical aspects of data protection and ensure that you are able to do everything correctly from a legal perspective while also protecting your customers' data in the best possible way.

If you need or want an external data protection officer, we will be happy to support you in this role. Our aim is to translate relevant regulations to your individual business processes and enable you to make good data protection decisions and use the available budget where it will benefit you and your customers the most.

We will develop a structure for a data protection management system for you and work with you to bring it to life. You can also count on us for the development of specific industry standards or certification requirements.

Why should you work with us here? Our strength lies in the interface between data protection and information security and therefore in our ability to work effectively with our clients at all legal, operational and technical levels.

You are also welcome to contact us about the following concerns and specialist areas:

  • Risk analysis (threat modeling)
  • Security training
    • Security awareness training
    • Secure Coding & Development Practices
    • SecOps (Secure Development Operations, Secure Operations / IT Operations)
    • Training of employees in the context of compliance requirements
  • Red teaming
  • Creation of emergency procedures (company-wide plan for security emergencies)

Software

Building and optimizing your entire software lifecycle, from requirements management to detailed implementation, full-stack development, code security and automation - that's what we stand for and you can count on us at every point. Here is an insight into what we can do for you:

Transform how you work with cloud applications and services. If you're seeking to enhance your existing applications or start from scratch, our extensive client project experience has you covered.

Maintain user privacy without sacrificing functionality. We integrate essential tools into your digital presence, ensuring you manage your data sovereignly without relying on third-party services.

Prioritize user experience in your web applications and sites. We focus on intuitive navigation and self-explanatory interfaces that minimize training and maximize efficiency. Let us help elevate your digital interface to an unforgettable user experience.

We are happy to advise you in the areas of UX and usability to make your digital product a unique experience. We would be happy to optimize your existing online presence or work with you to design your new website.

From selecting the appropriate framework to establishing a robust CI environment, we partner with you throughout the development lifecycle to ensure seamless, agile project execution.


Systems

We offer system integration for Linux-based infrastructures with a focus on digitization and automation. We modernize legacy infrastructures, integrate (manual) workflows and connect your systems without vendor locking.

Through the consistent use of open source solutions, we improve both maintainability and security.

We can support your company in the following areas:

We have extensive knowledge of setting up and integrating monitoring systems for your existing or new infrastructure. You get a monitoring system that ...

  • is ready to go, implemented in minutes, fully open source and fully customizable: our monitoring and alerting stack consists of Ansible, Prometheus, Grafana and Alertmanager
  • integrates with your existing monitoring solutions (Nagios, etc.)
  • extends your existing monitoring solutions with debugging and other functions

We know you have that one cronjob running a PHP CSV parser that is pushing data directly into another system's database somewhere in your infrastructure. We can help!

  • We design and implement modern APIs to connect your services
  • We modernize, add features to or debug existing APIs in your infrastructure
  • We set up centralized user & rights management concepts and systems

We can also help you manage your existing infrastructure. For example:

  • Setting up a CI/CD pipeline
  • Setting up extensible self-hosted Jitsi video conferencing servers for your organization
  • Set up Ansible to manage your infrastructure configuration
  • All things system administration! Configuring failovers or web servers, upgrading a Linux distribution, ...

Company

We develop and operate systems with a focus on security and stability. In the field of IT security, we provide consulting with the highest technical standards and support the introduction and implementation of security concepts.

Our core competencies include:

  • Software architecture and development
  • IT security consulting
  • Integration of software solutions
  • Architecture and operation of Linux servers and networks

Our team is ready with its diverse experience and knowledge to support you in your challenges.



Teamwork

Three crews, one team. Our experts in systems integration, software development, and IT security know what matters.

Professional photo of Michael Prinzinger Michael Prinzinger
CEO
Professional photo of Jörn Hahn Jörn Hahn
Security Consultant
Professional photo of Jonas Becker Jonas Becker
Systems Integration, Crew Lead
Professional photo of Tobias Brosge Tobias Brosge
Software Development
Professional photo of Artur Andretta Artur Andretta
Data Protection
Professional photo of Benjamin Waldl Benjamin Waldl
Systems Integration
Professional photo of Hung Truong Hung Truong
Controlling
Professional photo of Niels Geist Niels Geist
Systems Integration, Crew Lead
Professional photo of Alessandro Prati Alessandro Prati
System Administration
Professional photo of David Rohmer David Rohmer
Software Development
Professional photo of Artem Chornyi Artem Chornyi
Security
Professional photo of Eric Gattschau Eric Gattschau
Systems Integration
Professional photo of Patrick Weingärtner Patrick Weingärtner
Software Development
Professional photo of Jonas Winter Jonas Winter
Software Development

Want to become part of our team?
Join us now!


Partner

Defora Networks
Defora Networks
IT security consulting

With Defora Networks we share common views and ethics regarding IT security and open source in close cooperation. We often work together on projects and share our professional ideas.

Frachtwerk
Frachtwerk
Digital transformation

With our friends at Frachtwerk, we work on joint projects, share knowledge and expertise and support each other as best we can. Frachtwerk specializes in software consulting for large industrial projects, especially in the field of digital transformation, as well as in the in-house development of such software projects with a team of exceptionally qualified experts.

palladio Consulting
palladio Consulting
IT strategy

palladio consulting supports companies in leveraging efficiency potential at the interface between business and IT. In volatile times, palladio helps to identify specialist change requirements and translate them into technical solutions.

Bugshell
Bugshell
Community-powered penetration testing

Bugshell enables penetration tests and phishing simulations to be carried out simply and transparently. Track all tests live via the platform, export test results directly to your development environment.

Solid Point Consulting
Solid Point Consulting
security audits, consulting and training

Specialized in audits, consulting and training for information security and AI, Solid Point provides practical solutions for security and AI and helps to ensure compliance with standards like ISO 27001, ISO 22301, BSI IT-Grundschutz, TISAX, ISO 42001 and the GDPR.