From Selbst-Hosting Up To Outsourcing

A decision-making aid for companies

Whether it`s SaaS, cloud, managed service or on-premises: There are various terms circulating through the IT landscape these days when it comes to using software. With this overview, we compare the respective advantages and disadvantages to help companies find the right solution!


The BSI's IT-Grundschutz compendium helps to securely protect a company's own IT systems, data and processes in the age of digitalization. How can the password recommendations of the IT-Grundschutz be implemented in the best possible way with Password Safe and secure companies?

Password Guidelines

Time for a paradigm shift?

According to the German Federal Office for Information Security, passwords should only be changed for a specific reason. So which security policies are (still) advisable with regard to passwords, and which ones do actually increase the risk potential of cyberattacks?

The Human Security Gap

Are humans the weakest link in the corporate security chain? From social engineering attacks like deepfakes to data theft and bad passwords: We show the most important threat scenarios in terms of human error for companies and how you can best protect your company.

Loading this resource will connect to external servers which use cookies and other tracking technologies to personalize and improve experience. Further information can be found in our privacy policy.

Allow external media