{"id":960,"date":"2021-01-20T01:10:51","date_gmt":"2021-01-20T01:10:51","guid":{"rendered":"http:\/\/hkm-consulting.de\/home-wip\/"},"modified":"2024-08-27T20:03:18","modified_gmt":"2024-08-27T20:03:18","slug":"home","status":"publish","type":"page","link":"https:\/\/hkm-consulting.de\/en\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3 style=\"text-align: left;\"><strong>Our Vision<\/strong><\/h3>\n<p>Data security is the ultimate goal for all our innovations. For us, focussing on the three fundamental goals of data security is the starting point for every solution approach.<\/p>\n<p>Our vision is to provide fundamental solutions for the protection of availability, integrity and confidentiality. We are convinced that this is the only way to secure intellectual property from the ground up.<\/p>\n<h3>Our mission<\/h3>\n<p>We specialise in the conception, design and integration of IT systems in data centres, incorporating state-of-the-art security technologies and organisational methods.<\/p>\n<p>We offer highly scalable solutions for monitoring IT infrastructure (C2C), proving data integrity (EIM) and maintaining confidentiality (DLP). We develop and integrate these systems to ensure the confidentiality of your company data.<\/p>\n<p>In addition, we support you with customised frameworks for governance, risk and compliance to fulfil the regulatory requirements in your company.<\/p>\n<h3>Our status<\/h3>\n<p>We offer comprehensive business solutions for all three areas of cybersecurity. Our portfolio includes on-premise, IoT and cloud services. Our framework ensures compliance with ISO standards, the GDPR, the NIS-2 directive and the Cyber Resilience Act.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;16px&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-braille&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; custom_background_color=&#8221;#4b609f&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fcompliance_to_code%2F|title:Compliance%20to%20Code&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;&#8221;]<\/p>\n<h3 style=\"text-align: center;\">Compliance to Code<br \/>\n(C2C)<\/h3>\n<p style=\"text-align: center;\">Translation of compliance requirements<\/p>\n<p>[\/vc_column_text][vc_separator css_animation=&#8221;fadeInUp&#8221;]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-2856\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-2856 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Translation of regulatory and legal requirements into digital policies<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1379\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1379 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Establishment of a structured overview of all digital assets in the company<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-3174\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-3174 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Establishment of reliable and permanently monitored KPIs as a basis for risk &amp; compliance management<\/span><\/div><\/li><\/ul><\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;the7&#8243; icon_the7=&#8221;fas fa-search&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; custom_background_color=&#8221;#4b609f&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fenterprise_integrity_management%2F|title:Enterprise%20Integrity%20Management&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;&#8221;]<\/p>\n<h3 style=\"text-align: center;\">Enterprise Integrity Management<br \/>\n(EIM)<\/h3>\n<p style=\"text-align: center;\">Protection against data manipulation<\/p>\n<p>[\/vc_column_text][vc_separator css_animation=&#8221;fadeInUp&#8221;]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-1128\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-1128 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Demonstrate the integrity of critical corporate data<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-5663\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-5663 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Prevention of destruction and manipulation of sensitive data, especially by malicious code or ransomware<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-7481\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-7481 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Proof of compliance with standards or legal requirements<\/span><\/div><\/li><\/ul><\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;the7&#8243; icon_the7=&#8221;Defaults-diamond&#8221; color=&#8221;white&#8221; background_style=&#8221;rounded-less&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; custom_background_color=&#8221;#4b609f&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fdata_leakage_prevention%2F|title:Data%20Leakage%20Prevention&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;&#8221;]<\/p>\n<h3 style=\"text-align: center;\">Data Leakage Prevention<br \/>\n(DLP)<\/h3>\n<p style=\"text-align: center;\">Confidentiality protection<\/p>\n<p>[\/vc_column_text][vc_separator css_animation=&#8221;fadeInUp&#8221;]<div class=\"uavc-list-icon uavc-list-icon-wrapper ult-adjust-bottom-margin   \"><ul class=\"uavc-list\"><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-6806\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-6806 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Data loss detection and prevention<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-6003\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-6003 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Detection and prevention of data breaches, exfiltration or unwanted destruction of sensitive data<\/span><\/div><\/li><li><div class=\"uavc-list-content\" id=\"list-icon-wrap-2031\">\n<div class=\"uavc-list-icon  \" data-animation=\"\" data-animation-delay=\"03\" style=\"margin-right:4px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon circle \"  style=\"color:#4b609f;background:#ffffff;font-size:28px;display:inline-block;\">\n\t<i class=\"dt-icon-the7-misc-017\"><\/i>\n<\/div><\/div><\/div>\n<\/div><span  data-ultimate-target='#list-icon-wrap-2031 .uavc-list-desc'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  class=\"uavc-list-desc ult-responsive\" style=\"\">Technical-organizational structure for compliance with the protection goal<\/span><\/div><\/li><\/ul><\/div>[\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221;][vc_column][vc_empty_space height=&#8221;1px&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_btn title=&#8221;More about C2C&#8230;&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fcompliance_to_code%2F|title:Compliance%20to%20Code&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_btn title=&#8221;More about EIM&#8230;&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fenterprise_integrity_management%2F|title:Enterprise%20Integrity%20Management&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_btn title=&#8221;More about DLP&#8230;&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInUp&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fdata_leakage_prevention%2F|title:Data%20Leakage%20Prevention&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row bg_type=&#8221;bg_color&#8221; bg_override=&#8221;ex-full&#8221; css=&#8221;.vc_custom_1608730352968{background-image: url(https:\/\/hkm-consulting.de\/wp-content\/uploads\/2018\/09\/img_about_blue_1300.png?id=217) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; bg_color_value=&#8221;#4b609f&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1608731514877{background-image: url(https:\/\/hkm-consulting.de\/wp-content\/uploads\/2018\/09\/img_about.png?id=196) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_empty_space height=&#8221;230px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3 style=\"color: white;\"><span style=\"color: #ffffff;\">About HKM and HKM Consulting<\/span><\/h3>\n<p><span style=\"color: #ffffff;\">Klaus Martin Hecht is the creative mind behind HKM and HKM Consulting. He started his IT consulting business in 1993 with visionary solutions for the then novel IT outsourcing.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Through the successful use of information security solutions to protect intellectual property, he is considered a pioneer of DLP &#8211; Data Leakage Prevention.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Today, with HKM Consulting, he offers solutions in all three areas of IT security and advises companies on governance, risk &amp; compliance.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;] Our Vision Data security is the ultimate goal for all our innovations. For us, focussing on the three fundamental goals of data security is the starting point for every solution approach. Our vision is to provide fundamental solutions for the protection of availability, integrity and confidentiality. We are convinced that this&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-960","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=960"}],"version-history":[{"count":54,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/960\/revisions"}],"predecessor-version":[{"id":3350,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/960\/revisions\/3350"}],"wp:attachment":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}