• OTRS Home
  • OTRS Software Solutions
    Customizable Software
    OTRS
    OTRS is a highly customizable help desk system. Find your perfect solution.
    Service Levels
    How To Buy

    Upgrade to OTRS 8
    OTRS On-Premise & Managed Comparison
    ((OTRS)) Community Edition
    WhatsApp Integration for OTRS
    OTRS App
    Feature List
    Feature Add-ons
    Solutions for
    IT Service Management
    Support for your IT department with automated, ITIL4-compliant processes
    Office Management
    Automate office management processes with our software solution
    HR Management
    Support your HR team with numerous processes, such as application or leave management
    Information Security Management – CONTROL
    Complete ready-to-implement compliance ISMS solution according to ISO/IEC 27001
    Cyber Defense & Security Incidents – STORM
    The solution for fast security orchestration, automation, and incident response

    Product and Service Life Cycle
    Release Notes
    Security Advisories
  • Use Cases
    Service Management
      • Customer Service Software
      • Help Desk Software
      • Solution Desk
    • ITSM – IT Service Management
      Security Management
        • Corporate Security
        • Security Incident Management
        • Vulnerability Management
        • ISMS
        • ISO 27001 Certification – What to Consider
      Task Management
      • Ticketing System
        Asset Management
        • CMDB
            Technology Management
            • BPMS – Business Process Management Software
              Knowledge Management
              • Knowledge Management in Customer Service
              • Services
                OTRS Services
                Services
                Consulting, training, customer service: Find official OTRS services

                FAQ
                OTRS Trainings
                Webinars about OTRS
                Get useful information about the latest OTRS version. Watch how OTRS works.
                Academy
                Stay up-to-date with your knowledge about OTRS. Book a training.
                Customer Portal
                Contact Sales
                Contact Consulting
                Contact Customer Service
              • Success Stories
              • OTRSmag
              • Contact
              • ENEN
                • DEDE
                • ESES
                • PTPT
                • HUHU
              • ENEN
                • DEDE
                • ESES
                • PTPT
                • HUHU
              fill 7
              Home › Corporate Security
              fill 7
              Category

              Corporate Security

              Corporate security is a top concern for today’s businesses. Disguised by the Internet, criminals would like nothing better than
              to profit from your business’ data or disrupt your service delivery. They lurk in the shadows while your corporate security team races
              to improve upon their security initiatives, keeping the company, employees and customers safe. Despite all of the planning, attacks can still happen.
              When they do, the corporate security team’s response must be measured, communicated and documented.

              In this section of OTRSmag, our internal security expert Jens Bothe leads the conversation. With help from guest bloggers, he examines
              the corporate security landscape and ponders tomorrow’s security trends/needs. As they share tactical advice, like implementing structured workflows,
              and theoretical dialogue, such as the responsibility cloud service providers assume on behalf of their customers,
              we invite you to join the OTRS security team in examining the best ways to protect your business from modern threats.

              21
              19/09/2022 | Andreas Bender
              Whistleblower System According to EU Whistle­blowing Directive – A Guide

              Whistleblower System According to EU Whistle­blowing Directive – A Guide

              From 2023, it will be mandatory for companies, authorities and organizations with 50 or more employees to create a whistleblower protection system. Learn what needs to be considered and how OTRS can support you.
              Corporate Security | Developing a Corporate Culture | General | Leadership
              08/07/2022 | Bernd Maus
              ISO 27001 Certification – What to Consider

              ISO 27001 Certification – What to Consider

              ISO 27001 certification signifies that a company or organization has established an ISMS that is in line with the international standard. Learn what you need to look out for and how to find the right ISMS solution to support certification efforts.
              Corporate Security | Digital Transformation | General
              21/02/2022 | Bernd Maus
              Risk Management Software – Function and Application

              Risk Management Software – Function and Application

              Risk management software helps organize, manage and control a company's risk based on up-to-date data.
              Corporate Security | Developing a Corporate Culture | Digital Transformation | General
              07/02/2022 | Bernd Maus
              What is Governance, Risk & Compliance (GRC)?

              What is Governance, Risk & Compliance (GRC)?

              Governance, Risk & Compliance (GRC) defines the 3 most important areas of corporate governance.
              Corporate Security | Developing a Corporate Culture | General | Leadership
              19/01/2022 | Bernd Maus
              Risk Management – Process, Analysis and Methods

              Risk Management –
              Process, Analysis and Methods

              Risk management is an essential component of GRC alongside corporate governance. This is how you prepare your company for risks and recognize opportunities.
              Corporate Security | General
              26/10/2021 | Luciano Alves De Oliveira
              Grey Market vs. In-House vs. Product Manufacturer. How to decide?

              Grey Market vs. In-House vs. Product Manufacturer. How to decide?

              Grey market, product manufacturer, create it ourselves, or stick with what we do today . . . As you set technology priorities for the upcoming year, you will investigate products and services to improve workflows and offer more security.
              Corporate Security | Digital Transformation | ITSM
              06/09/2021 | Jens Bothe
              IoT Cyber Security: Security for Smart Objects

              IoT Cyber Security: Security for Smart Objects

              Networking, whether in the smart home or Industry 4.0, brings many advantages. But it also provides more opportunity for cyber attacks. Here is an overview.
              Corporate Security
              26/08/2021 | Jens Bothe
              Five-step Plan for IT Security in Manufacturing

              Five-step Plan for IT Security in Manufacturing

              A step-by-step plan helps increase IT security in production. More than half of companies are not ideally prepared for an IT security incident.
              Corporate Security | Digital Transformation
              23/08/2021 | Luciano Alves De Oliveira
              Improve Response Times with Automated Security Processes

              Improve Response Times with Automated Security Processes

              Automated security processes are more important today than ever before. Fast response times can avoid damage and high fines. Get informed now.
              Corporate Security
              09/08/2021 | Jens Bothe
              Cyber Resilience in Companies

              Cyber Resilience in Companies

              Does your company have the capabilities to recover as quickly as possible in the event of a cyber attack? Read why your company should be brought back to normal as quickly as possible and damage from cyber attacks should be kept to a minimum.
              Corporate Security
              24/05/2021 | Jens Bothe
              About the right cyber security tool

              About the right cyber security tool

              Finding the right cyber security tool is not always easy. We have prepared a selection of tools and explain the differences.
              Corporate Security
              13/04/2021 | Enrico Schwenke
              Weaknesses and Vulnerabilities: Why They Should Not Be Ignored

              Weaknesses and Vulnerabilities: Why They Should Not Be Ignored

              Are vulnerabilities only limited to IT, or do they also have something to do with us? And when do we have to counter them and, above all, how?
              Corporate Security
              06/04/2021 | Luciano Alves De Oliveira
              Pairing SOAR and SIEM Tools Means Faster Time to Resolution

              Pairing SOAR and SIEM Tools Means Faster Time to Resolution

              Faster time to resolution requires the right tools.
              Corporate Security
              08/03/2021 | Jens Bothe
              Cyber security and Cyberattacks: Investments that pay off

              Cyber security and Cyberattacks: Investments that pay off

              The digitization of business is picking up speed. Find out why cyber security should not be neglected here.
              Corporate Security
              04/11/2020 | Jens Bothe
              Introduction to Successful Incident Management

              Introduction to Successful Incident Management

              How does an incident management process work? What has to be considered in case of an incident? And how can STORM help?
              Corporate Security
              27/01/2020 | Jens Bothe
              How public authorities should deal with security risks

              How public authorities should deal with security risks

              Tighter security measures apply to critical infrastructures. We provide recommendations for risk management.
              Corporate Security
              13/01/2020 | Christopher Kuhn
              CCPA Continues GDPR Trends

              CCPA Continues GDPR Trends

              The CCPA went into effect on January 1, 2020. What will it mean to businesses?
              Corporate Security
              27/05/2019 | Jens Bothe
              Infrastructure Security Requires Team Work

              Infrastructure Security Requires Team Work

              Infrastructure security is a critical concern that requires coordinated attention by governments, businesses and individuals.
              Corporate Security
              15/04/2019 | Francisco Cruz
              How ITIL 4 Increases Business Flexibility

              How ITIL 4 Increases Business Flexibility

              ITIL 4 can help you to break out of silo thinking through more flexibility.
              Corporate Security
              03/12/2018 | Christopher Kuhn
              Is Your Business Ready For Consumer-Driven Change?

              Is Your Business Ready For Consumer-Driven Change?

              With the introduction of the DSGVO more people are sensitized to what happens with their data.
              Corporate Security
              08/10/2018 | Jens Bothe
              Protecting Your Company From Cyberattacks: Avoid Risky Cloud-Based Solution Providers

              Protecting Your Company From Cyberattacks:
              Avoid Risky Cloud-Based Solution Providers

              If you're considering a cloud-based option for your business, take time to ask your provider the following 12 questions to keep your data safe.
              Corporate Security

              Follow us

              FacebookTwitterLinkedInYouTube
              OTRS Software Solutions
              • OTRS
              • Cyber Defense & Security Incidents – STORM
              • Information Security Management – CONTROL
              • OTRS On-Premise & Managed Comparison
              • Product and Service Life Cycle
              • Release Notes
              • Security Advisories
              • Vulnerability Disclosure Policy
              • User and Admin Manual
              • How To Buy
              • Contact
              Features
              • Feature List
              • Feature Add-ons
              • Business Object Management
              • Channels
              • Security and Permissions
              • Automation & Processes
              • Time Management
              • Integration Features
              • Customer Management
              • Knowledge Management
              • Self Service
              • Individualization
              • Reporting
              Use Cases
              • BPMS – Business Process Management Software
              • Customer Service Software
              • Help Desk Software
              • IT Security Software
              • Service Management Software In Accordance With GDPR
              • Remote Work Software
              • Success Stories
              Services
              • Consulting
              • Integrations
              • Academy
              • Webinars about OTRS
              • Service Levels
              • Your Data, Our Responsibility
              • FAQ
              Company
              • About Us
              • Blog
              • Podcast
              • Careers
              • Events
              • Investor Relations
              • Partners
              Contact Us
              • Customer Support
              • Contact
              • Employment
              • Media Inquiries
              © copyright 2023, OTRS AG
              • Legal Notice
              • Privacy Statement
              • GDPR
              • Terms of Use
              • Aviso de Privacidad
              • Cookie Settings
              • Legal Notice
              • Privacy Statement
              • GDPR
              • Terms of Use
              • Aviso de Privacidad
              • Cookie Settings
              Instagram Twitter Facebook Linkedin Youtube