Our Mission
We help enterprises plan secure IT infrastructures, assess IT services, mitigate risks and run compliant operations.
We are exhibiting at IT-SA in Nuremberg on 7-9 October! Stop by our booth 6-342 to meet our experts. See you there!
We help enterprises plan secure IT infrastructures, assess IT services, mitigate risks and run compliant operations.
We strive to provide a holistic security strategy and solid framework, educate development and guide operations. Together with our clients, we work to automate validation and monitor for deviations, communicate risks and provide prudent mitigations.
We conduct black box, grey box and white box penetration tests and structured assessments for infrastructures and applications. We offer end-to-end penetration services, including initial scoping, execution, status follow-up and re-test services.
You develop software? Then, protect your crown jewels. Software build pipelines are the heart of software production and must meet the highest security standards to ensure the availability and foremost, the integrity of your delivered service or software. We perform security assessments and offer security architecture consulting to enable secure software delivery.
We provide a holistic vulnerability management service, including customised vulnerability advisory services, infrastructure and application vulnerability scans, false-positive verification, adapted scoring of vulnerabilities, dispatching and vulnerability resolution support.
A solid security policy framework, combined with automation, is the foundation for a secure enterprise culture and efficient IT operations. We work with clients to develop and update hardening procedures, apply industry best practices, and leverage automation for compliance verification, monitoring, and remediation—ensuring transparency, efficiency, and readiness for certifications such as ISO and SOC.
We support you in defending against cyber attacks. We provide consulting services in the field of SOC and SIEM. We help you derive and improve central concepts such as the Cyber Killchain or MITRE ATT&CK®. We work with companies to create and improve security monitoring use cases for SIEM platforms like Splunk, QRadar, etc.
MISP is a powerful open-source threat intelligence platform, but setting it up, securing it, and maintaining updates can be complex and time-consuming. The service goMISP provides a cloud-based, ready-to-use MISP instances, fully managed and continuously updated, so you can focus on staying ahead of cyber threats and not worry about the operation and security of the platform. With goMISP, you get all the benefits of MISP - without the operational burden!
Our core expertise lies within the products and services provided by SAP. We help our clients run secure on-premise SAP NetWeaverTM, SAP S4HANA® deployments and assess SAP Cloud services like SAP® HANA Enterprise Cloud, SAP® SuccessFactors®, SAP® Ariba®, SAP® Concur® and SAP® Fieldglass®.
A roadmap to SAP NetWeaver Security helping you prioritise tasks and activities of your SAP Security Program
The five most important technical security measures you need to consider in order to protect you SAP NetWeaver systems from a security breach
A comprehensive list of security-relevant SAP NetWeaver profile parameters and a WALLSEC recommendation on how to configure those
Forward your SAP NetWeaver Audit Log to a Splunk Indexer without the need for any third party adapters, add-ons and tools
Software CI/CD Build Pipelines are by far the finest hacker targets - hackers need to compromise an environment that is anyways difficult to secure and the vendor will take care of the logistics and distribution of the hacker's malware
WALLSEC GmbH
Industriestrasse 44
69190 - Walldorf
Germany
Tel: +49 6227 6550040
Email: contact@wallsec.de | PGP Key