We analyze, specify, and advise.
Our goal is to find the best possible solution for the real-world application.
At ITS, we focus on the processes in IT systems together with their applications and interfaces. We analyze and document existing processes in order to create new processes, optimize existing processes, or develop new solutions.
From the initial customer idea, we concretize projects and develop them into business models. For their implementation, we identify the functional system requirements and draw up the specifications. We use market screening and product benchmarking to look for suitable approaches to develop the optimal solution design. We then evaluate this in the context of risk analyses, carry out preliminary tests in our own laboratory as required, and make our recommendations for action.
In the next step, we take over the tender process as well as the implementation at the customer's site. We attach particular importance to change management in order to ensure that future users are up to speed right from the beginning. Accordingly, the planning, organization, and implementation of training courses also belongs to our understanding of the consulting process.
Only data which is current and complete can provide the necessary quality for further use. In information management, our focus is on ensuring data quality and optimizing it. We use statistical and mathematical models to analyze our customers' data (big data). One-time evaluations such as regularly implemented reports, as shown in GEMRIS, for example, provide our customers with important information for the further development or optimization of their business models.
In the area of IT security, we distinguish between technical and systemic aspects: We advise our customers “technically” as to how they can protect their data from unauthorized access by third parties. With the “systemic” approach, we ensure IT security in terms of data availability.
Our consultants have expertise in the IT baseline protection test procedures in accordance with the BSI standard and the BSI KritIS (critical infrastructure) regulation. They are certified accordingly, and advise and prepare our customers for their respective audits. While certification for IT baseline protection is voluntary and can be adapted to the size of the company, the KritIS regulation has become significantly more important due to its mandatory effect on critical infrastructures. These include all organizations and facilities that are necessary for public services, such as hospitals or power grids.