{"id":1425,"date":"2021-02-06T23:21:18","date_gmt":"2021-02-06T23:21:18","guid":{"rendered":"http:\/\/hkm-consulting.de\/product-data-sheets\/"},"modified":"2024-09-08T19:30:43","modified_gmt":"2024-09-08T19:30:43","slug":"product_data_sheets","status":"publish","type":"page","link":"https:\/\/hkm-consulting.de\/en\/product_data_sheets\/","title":{"rendered":"Product data sheets"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h3>Product data sheets<\/h3>\n<p>Here you will find a small selection of product data sheets for our solutions. For extended access please register via the partner portal.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Enterprise Integrity Management (EIM)<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2643&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Enterprise Integrity Management &#8211; Product Capabilities<\/h3>\n<p>Status: January 2023<\/p>\n<p>Performance description of the EIM solution<br \/>\nRequirements for the solution<br \/>\nFulfillment of compliance requirements[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FEnterprise-Integrity-Management-Product-Capabilities.pdf|title:Download|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;1640&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Enterprise Integrity Management &#8211; Product Overview<\/h3>\n<p>Status: November 2020<\/p>\n<p>Technical structure of the solutions (high-level)<br \/>\nCentralized and distributed services<br \/>\nSolution design and scaling[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2021%2F02%2FEnterprise-Integrity-Management-Product-Overview.pdf|title:Download|target:_blank|&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Compliance to Code (C2C)<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2645&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Compliance to Code &#8211; Product Capabilities<\/h3>\n<p>Status: January 2023<\/p>\n<p>Performance description of the C2C solution<br \/>\nRequirements for the solution<br \/>\nFulfillment of compliance requirements[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FCompliance-to-Code-Product-Capabilities.pdf|title:Download|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Data Leakage Prevention (DLP)<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2647&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Data Leakage Prevention &#8211; Product Capabilities<\/h3>\n<p>Status: January 2023<\/p>\n<p>Performance description of the DLP solution<br \/>\nRequirements for the solution<br \/>\nFulfillment of compliance requirements[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FData-Leakage-Prevention-Product-Capabilities.pdf|title:Download|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Cyber Security Solutions \u2013 System Requirements<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2848&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Cyber Security \u2013 System Requirements (EIM, C2C &amp; DLP)<\/h3>\n<p>Status: February 2023<\/p>\n<p>Requirements on operating system, software, memory and hard disk size[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FCyber-Security-System-Requirements.pdf|title:Download|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Cyber Security &#8211; Framework<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2825&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Cyber Security &#8211; Framework (EIM, C2C, DLP)<\/h3>\n<p>Status: February 2023<\/p>\n<p>Framework components<br \/>\nSystem structure of the EIM, C2C &amp; DLP server<br \/>\nComponents of the EIM, C2C &amp; DLP server<br \/>\nStatement of Work[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FCyber-Security-Framework.pdf|title:Download|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Cyber Security Appliances<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2831&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Cyber Security Appliances (EIM, C2C &amp; DLP)<\/h3>\n<p>Status: February 2023<\/p>\n<p>System descriptions of the security appliance family for EIM, C2C &amp; DLP<br \/>\nIntegration of Root-Level, Crowd-Level and Edge-Level components<br \/>\nSystem structure from management server to IoT components[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FCyber-Security-Appliance.pdf|title:Download|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Cyber Security Workshops<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2836&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Cyber Security Workshops (EIM, C2C &amp; DLP)<\/h3>\n<p>Status: February 2023<\/p>\n<p>Status quo, requirements and challenges<br \/>\nTechnical-organisational possibilities through EIM, C2C, DLP and the all-connecting Framework<br \/>\nHow-To &#8211; Translating compliance requirements into policies<br \/>\nRoles and responsibilities for tasks within cyber security<br \/>\nRoadmap &#8211; Definition of a possible approach for integration[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F02%2FCyber-Security-Workshop.pdf|title:Download|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Cyber Security White Label<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;3030&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Cyber Security White Label (EIM, C2C &amp; DLP)<\/h3>\n<p>Status: May 2023<\/p>\n<p>White labeling of HKM Consulting GmbH CyberSecurity products and services.<\/p>\n<p>Increased brand awareness, customized user interface, greater control over pricing and many more.[\/vc_column_text][vc_btn title=&#8221;Download&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Fhkm-consulting.de%2Fwp-content%2Fuploads%2F2023%2F05%2FCyber-Security-White-Label.pdf|title:Download|target:_blank&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Product data sheets Here you will find a small selection of product data sheets for our solutions. For extended access please register via the partner portal.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Enterprise Integrity Management (EIM) [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2643&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text] Enterprise Integrity Management &#8211; Product Capabilities Status: January 2023 Performance description of the EIM solution Requirements for the&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1425","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=1425"}],"version-history":[{"count":61,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1425\/revisions"}],"predecessor-version":[{"id":3473,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1425\/revisions\/3473"}],"wp:attachment":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=1425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}