Kertos

Kertos

Softwareentwicklung

Die beste Technologie, für volles Vertrauen! Kertos „Best of Legal No. 1 in Compliance“

Info

Kertos is the modern backbone of every company’s privacy and compliance operations. We support in Data & Process Discovery, Data Subject Requests (e.g. customer data deletion), Access Management, Compliance Documentation and various Certification Frameworks such as ISO27001, SOC2, TISAX® and similar. Our intuitive no-code SaaS solution connects to the entire IT infrastructure, identifies compliance relevant assets and processes, related data and automates compliance workflows to get an organization certification ready within weeks.

Website
https://kertos.io
Branche
Softwareentwicklung
Größe
11–50 Beschäftigte
Hauptsitz
München
Art
Kapitalgesellschaft (AG, GmbH, UG etc.)
Gegründet
2021
Spezialgebiete
Data Privacy, Process Automation, Security, Compliance und GDPR

Orte

Beschäftigte von Kertos

Updates

  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    🚀 Boost Your Startup's Security with the #ISO27001 Boo(s)t Camp! 🚀  Ready to elevate your startup’s security game? Join Kertos' 6-week ISO 27001 Boo(s)t Camp! Designed for startups, this program offers: 🔒 Building a Security-Centric ISMS: Move beyond compliance to establish a strong, security-focused Information Security Management System (ISMS). This foundation will not only protect your data but also enhance trust among your stakeholders. 👨🏫 Expert Guidance: Learn from the best in the field! Benefit from the insights of Aron Lange and our Kertos experts. Participate in twice-weekly sessions where you can ask questions, engage in discussions, and receive personalized feedback. 📑 Practical Tools: Gain access to resources including detailed #projectplans, customizable templates, and the user-friendly Kertos platform. These tools are designed to streamline your journey towards ISO 27001 certification, making the process efficient and manageable.    🗓 Start Date: August 13, 2024  ⏰ Duration: 6 weeks By the end of this intensive boot camp, your startup will be well-equipped to secure its information assets and earn the trust of your clients. Apply now and start your journey to the ISO 27001 #certification! 👉 Sign up through the link in the comments! 

    • Kein Alt-Text für dieses Bild vorhanden
  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    We are pleased to announce a significant enhancement in our partnership with Aron Lange. 🚀 As a valued Kertos ISO 27001 customer, you now have the opportunity to deepen your understanding of #ISO27001. Gain practical experience in information security management through real-world scenarios and step-by-step guidance. ✨ Combining platform innovation with high-quality course content ✨ We are proud to offer a unique blend of innovative platform features, expert insights, and extensive training modules. This integration empowers companies to achieve compliance with ease and maintain the highest standards in information security. Benefit from unparalleled support and insights from industry experts. Stay ahead in the evolving landscape of information security and safeguard your organization with confidence. 👀 By the way, we have a special offer for startups coming up in August. Click the link below to find out more about the ISO 27001 Boo(s)t Camp! 👇 

    • Kein Alt-Text für dieses Bild vorhanden
  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    🚨 Concerned about #cybersecurity? As cyber threats evolve, European businesses face increasing risks from AI misuse, data breaches, and a critical skills shortage. Our latest #newsletter provides insights into current cybersecurity challenges and outlines key strategies to safeguard your digital assets. 👉 Check out this newest edition of our newsletter! #CyberSecurity #AI #skillshortage #databreaches

    Cybersecurity Concerns Rising:
AI, Data Breaches and the Cybersecurity Skill Shortage

    Cybersecurity Concerns Rising: AI, Data Breaches and the Cybersecurity Skill Shortage

    Kertos auf LinkedIn

  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    🎉 Congratulations to our customer Augmented Industries for getting ISO 27001 certified! 🎉 We want to share our latest customer success story with Augmented Industries! Discover how this innovative company achieved ISO 27001 certification in a record 2.5 months with the help of Kertos. 🔍 What’s inside the story?  • How Augmented Industries streamlined their compliance framework with Kertos OS  • How Kertos automated compliance solution fast-tracked the ISO 27001 certification process This is a testament to how the right technology can streamline the compliance processes, ensuring robust security practices and setting new industry benchmarks for information security. 👉 Dive into the full success story to learn more about this remarkable achievement and how Kertos can help you reach your compliance goals efficiently. #SuccessStory #Compliance #ISO27001 

  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    Welcome Back to Our A-Z Series on ISO 27001 and Information Security! 🎉  In our previous posts, we’ve covered critical topics like authentication, backup, confidentiality, data breaches, encryption, and firewalls. Today, we’re delving into an essential aspect of information security management:   G is for Governance Governance in information security refers to the framework of policies, procedures, and controls ensuring an organization’s IT and data management practices align with its objectives, legal requirements, and industry standards. 🔍 Why Governance is Important ▸ Strategic Alignment: Aligns information security strategies with organizational goals. ▸ Risk Management: Identifies, assesses, and mitigates risks to protect information assets. ▸ Regulatory Compliance: Ensures adherence to legal and industry standards like GDPR, HIPAA, and ISO/IEC 27001. ⚙️ Key Components of Information Security Governance ▸ Policy Development: Create and maintain comprehensive information security policies. ▸ Risk Management Framework: Implement frameworks to assess and mitigate security risks. ▸ Compliance Management: Regularly review policies to stay compliant with relevant laws and standards. ▸ Incident Management: Develop plans to address security incidents quickly. ▸ Audit and Assurance: Conduct audits to evaluate security controls and identify improvement areas. ▸ Training and Awareness: Educate employees about security policies and best practices. ✅ Best Practices for Effective Governance ▸ Top-Down Approach: Ensure senior management is committed to information security governance. ▸ Clear Policies and Procedures: Develop accessible and understandable policies for all employees. ▸ Integration with Business Processes: Incorporate security considerations into daily operations. Effective governance is the backbone of a robust information security program, providing the structure and oversight needed to protect information assets and ensure regulatory compliance. Stay tuned for our next post in the series: “H is for Honeypot,” where we’ll explore how honeypots are used to detect and analyze cyber threats. #InformationSecurity #ISO27001 #Governance #CyberSecurity #RiskManagement

    • Kein Alt-Text für dieses Bild vorhanden
  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    Did you miss the webinar on #ISO27001? Don’t worry! We had an engaging session discussing the critical aspects of #ISO27001 and how it can #elevate your organization’s information security management. 🚀 🤝 Our experts, Dr. Kilian Schmidt, CEO of Kertos, and Julian Lübke, Founder of deeploi, demonstrated how companies of all sizes can streamline their IT administration and ISMS process for the ISO 27001 certification. Learn more about: • Why ISO 27001 is one of the most sought-after certifications  • Common challenges in the certification process and how to overcome them  • How deeploi and Kertos helped GAIA streamline their ISO 27001 certification and helped them pass their audit on the first try 👉 You can still catch up by watching the recording now - click the link below.

    • Kein Alt-Text für dieses Bild vorhanden
  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    🌟 Welcome to the Team, Nomy! 🌟 We are excited to announce that Nomy Gossmann has joined Kertos as our new Working Student in #DigitalMarketing!  Nomy will be working remotely, providing her with the flexibility she needs to balance #work and #study. She is passionate about creating engaging and versatile content that #captivates and #intrigues, sparking our audience's curiosity about Kertos and compliance automation as a whole. With her love for the diverse facets of marketing, she thrives on the endless opportunities it offers for creative expression.    Join us in welcoming Nomy to the team! We can't wait to see the innovative and engaging content Nomy will bring to our team. 💕    #WelcomeAboard

    • Kein Alt-Text für dieses Bild vorhanden
  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    Welcome Back to Our A-Z Series on ISO and Information Security! 🎉 In our previous posts, we've covered essential topics like Authentication, Backup, Confidentiality, Data Breaches, and Encryption. Today, we’ll focus on a critical tool for protecting your network: F is for #Firewall 🔥🔥🔥 A firewall is a network security device that monitors and controls network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet. Firewalls are essential for protecting networks from unauthorized access and cyber threats. 🔍 Why Firewalls are Important ▴ Network Protection: Firewalls block unauthorized access to your network. ▴ Traffic Monitoring: They monitor network traffic and filter out malicious data packets. ▴ Access Control: Firewalls enforce access control policies, ensuring that only authorized users and devices can access specific network resources. ▴ Compliance: Many regulations and standards (e.g. ISO/IEC 27001) require the use of firewalls. ⚙️ Types of Firewalls ▴ Packet-Filtering Firewalls: Inspect packets of data and filter them based on IP addresses, port numbers, and protocols. Pros: Simple and effective for basic filtering. Cons: Limited to filtering individual packets and not effective against more demanding threats. ▴ Stateful Inspection Firewalls: Track active connections and make decisions based on the context of the traffic.   Pros: More secure than packet-filtering firewalls. Cons: Can be more resource-intensive and complex to configure. ▴ Proxy Firewalls: Act as an intermediary between users and the internet, filtering traffic at the application level.   Pros: Provide inspection of traffic and filter based on application-specific commands. Cons: Can slow down network performance and require more resources. ▴ Next-Generation Firewalls (NGFW): Combine traditional firewall capabilities with security features.   Pros: Comprehensive security by integrating multiple functions into one device. Cons: Can be more expensive and complex to manage. Best Practices for Using Firewalls ▴ Regular Updates: Keep your firewall software and firmware updated. ▴ Define Clear Rules: Establish and regularly review security rules and policies for your firewall. ▴ Monitor and Log Traffic: Continuously monitor and log network traffic to detect suspicious activities. ▴ Implement Multiple Layers: Use firewalls in conjunction with other security measures for a layered defense strategy. ▴ Conduct Regular Audits: Perform regular security audits and penetration testing to ensure your firewall configurations are effective. Firewalls are a fundamental component of network security, providing essential protection against unauthorized access and cyber threats.   Stay tuned for our next post in the series: "G is for Governance", where we’ll explore the role of governance in information security.   #InformationSecurity #Firewall #ISOABC #Kertos

    • Kein Alt-Text für dieses Bild vorhanden
  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    🔐 Unlock the Power of #ISO27001 for Your Business! 🔐 Navigating the complexities of information security can be daunting, but ISO 27001 provides a clear path to safeguarding your organization's data. Join us for an exclusive webinar hosted by Kertos and deeploi, where deeploi founder Julian Lübke and Kertos CEO Dr. Kilian Schmidt, will share their expertise and insights on the value of ISO 27001 and how to get certified as a startup, scaleup or agency. 💻 Webinar: “The value of ISO 27001 and how to streamline certification” 🗓 Date: 04.07.2024 ⏰ Time: 14:00-14:45 (MESZ) Don't miss this opportunity to learn more about compliance from some of the best in the industry and find out how you can implement ISO 27001 way #faster and #easier. 👉 Click the first link in the comments to register for the webinar now! #ISO27001 #InformationSecurity #Webinar

    • Kein Alt-Text für dieses Bild vorhanden
  • Unternehmensseite von Kertos anzeigen, Grafik

    2.032 Follower:innen

    We are excited to announce our partnership with Aron Lange, founder of The GRC Lab and former #basketball coach! 🏀   Aron's journey from coaching professional athletes to becoming a #leading #GRC voice is truly inspiring. His leadership, strategic vision, and enthusiasm make him a perfect fit for Kertos. 🔒 Together, we combine ISO 27001 expertise and innovation to help SaaS businesses of all scales handle risk and demonstrate real-time security. 🚀🚀   Thank you, Aron, for your continuous support and dedication to the #KertosMission!

    • Kein Alt-Text für dieses Bild vorhanden

Ähnliche Seiten

Jobs durchsuchen

Finanzierung

Kertos Insgesamt 2 Finanzierungsrunden

Letzte Runde

Seed

4.409.239,00 $

Weitere Informationen auf Crunchbase