Safety and responsibility for today and tomorrow
In an increasingly networked world, cyber security and digitalization are indispensable components of modern technologies and processes in the manufacturing industry. Innovative solutions lead companies securely and efficiently into the digital future. The decisive factor here is the first step, which we are happy to assist you with.
Our expertise ranges from the implementation of highly secure IT infrastructures to the development of tailor-made digitalization solutions that optimize and protect your business processes.
Cyber Security
- Risk assessment of the current IT
- Network Analysis
- Automated anomaly detection
- Prevention
- Consulting services for ISO 27001 and BSI basic protection
- Implementation of ISMS and PSIM (Information Security Management Systems and Physical Security Information Management)
- Advice on IEC 62443 for a secure OT environment
- (Industrial) Cloud
- IaaS
- SaaS
- AI
- Modern dashboarding
- Paperless processes
- Consulting for digitization strategy
IT and OT
- Hardware
- Network technology
- Infrastructure services
- Automation infrastructure
YOUR CONTACT PERSONS
What can we do for you?
Please call or email us.
We are looking forward to your inquiry.
Sven Ebbinghaus
Site Manager MAR South
Digitization | Information security
MAR Marine and
Automation technology Rostock GmbH
Hundsburgallee 9c
18106 Rostock
In today's digital era, where IT and OT are increasingly interconnected, cyber security is critical. Companies need to protect their infrastructures from a wide range of threats, from simple malware to targeted attacks.
Laws and standards
NIS 2.0
Cyber security of network and information systems
CRITIS
Classification via entrepreneurs who are personally liable
IEC 62443
Regulates industrial communication networks and IACS
ISO 27001
Defines basic IT protection
Important changes from 17.10.2024
The new NIS-2 Regulation changes legal measures to increase the overall level of cybersecurity in the EU.
Our service portfolio
- Network and infrastructure security
- Access and identity management
- Endpoint and device security
- Data and communication security
- Actual state
- Definition of target state
- Identification and analysis of security gaps (GAPs)
- Development of measures to close the GAPs
Creation of a detailed roadmap with schedule for implementation of immediate measures and long-term security solutions, monitoring and documentation
Implementation of So
- Actual state
- Definition of target state
- Identification and analysis of security gaps (GAPs)
- Development of measures to close the GAPs
Creation of a detailed roadmap with schedule for implementation of immediate measures and long-term security solutions, monitoring and documentation