Skip to content
Dawico

Harden Windows. Implement compliance. Eliminate risks.

Standard Windows installations are not secure enough, regulatory requirements are becoming stricter - and if the worst does happen, every minute counts. Dawico combines technical Windows hardening with pragmatic compliance implementation and structured crisis management. Prevention and emergency response from a single source - local and international.

DAWICO STRENGTH: Dawico played a key role in developing DIN SPEC 27099 and secures Windows environments according to CIS benchmarks and BSI Grundschutz. In an emergency we are also reachable outside business hours - initial damage control within a few hours.

Windows hardening

  • Group policies (GPO): enforce security settings centrally
  • Minimize services: disable unnecessary Windows services
  • BitLocker encryption for all drives
  • Configure Windows Defender / endpoint protection correctly
  • RDP hardening: NLA, port change, access restriction
  • Password and account policies according to best practice
  • Local Administrator Password Solution (LAPS)
  • PowerShell restrictions and execution policies
  • Windows firewall: rule-based access control

Endpoint Security & Managed Protection

Modern endpoint protection goes far beyond classic antivirus. We rely on a multi-layered strategy with managed detection & response.

  • Endpoint Detection & Response (EDR): behavior-based detection instead of signature checks alone
  • Centrally managed antivirus solutions with real-time monitoring and reporting
  • Application whitelisting: only approved software may be executed
  • USB and device control: which external devices may be connected?
  • Automated patch management: roll out security updates promptly and in a controlled manner
  • Security dashboards: overview of the security status of all endpoints
Dawico exclusive

DIN SPEC 27099 - data security to standard

Dawico played a key role in developing DIN SPEC 27099. This standard defines how companies effectively secure their data against unauthorized access, manipulation and theft through a three-tier network architecture.

  • Three-tier network architecture: no access by unauthorized users
  • Protection of critical data: source code, passwords, customer data
  • Analysis of your individual security requirements
  • Tailored solutions according to DIN SPEC 27099
  • Integration into existing work processes without loss of productivity

Compliance Onboarding

We analyze your IT, identify gaps and implement concrete measures. Pragmatic instead of bureaucratic.

Gap analysis against GDPR, ISO 27001, BSI Grundschutz, DIN SPEC 27099

IT baseline protection per BSI: 5-layer model from infrastructure to application

Implementation of technical and organizational measures

Documentation for audits and certifications

Training for your team

Preparation for external audits

IT crisis management & incident response

Ransomware encrypts your data, the Exchange server is compromised, Active Directory no longer responds - IT crises arrive without warning and every hour counts. Dawico offers fast, structured help based on a proven 4-stage model aligned with BSI 100-4 and common incident response frameworks.

1

Analysis

What happened? Which systems are affected? Initial forensic preservation of log data and artifacts

2

Containment

Isolate affected systems, separate network segments, stop the spread immediately

3

Recovery

Restore systems from clean backups, bring services back online by priority, verify data integrity

4

Hardening

Identify and close the entry point, patch security vulnerabilities, tighten monitoring, document lessons learned

Typical crisis scenarios

  • Ransomware attack: isolate encrypted systems, stop the spread, evaluate decryption options
  • Server failure: identify the cause, activate failover, restore services
  • Data loss: check backup integrity, initiate restore, reconstruct missing data
  • Compromised accounts: lock access, analyze lateral movement, reset passwords
  • DDoS attack: traffic analysis, set filter rules, restore availability
  • Communication support towards customers, authorities, cyber insurers and the BSI

Prevention & emergency planning

The best crisis is the one that never happens. And if it does come, a tested emergency plan makes the difference between hours and weeks of downtime.

  • Create disaster recovery plans: recovery sequence, define RTO/RPO, assign responsibilities
  • Review and optimize backup strategies: 3-2-1 rule, air-gapped backups, regular restore tests
  • Conduct emergency drills: simulate scenarios, expose weaknesses, measure response times
  • BSI 100-4 emergency management: structured implementation per the BSI standard for business continuity
  • Incident response runbooks: step-by-step guides for the most common crisis scenarios
  • Employee training: recognize phishing, know reporting channels, react correctly in an emergency

International IT security

Cyber threats do not stop at national borders. If your company operates internationally, your IT security needs a global perspective.

  • Multi-site security concepts: consistent security standards across all locations
  • VPN architecture for international site networking - secure and high-performance
  • Compliance across borders: GDPR, CCPA, industry-specific regulations
  • Threat intelligence: monitoring regional threat landscapes and adapting protective measures
  • Incident response with an international focus: coordination across time zones
  • Security awareness trainings for multicultural teams

Do you want to secure your IT - or need help in an emergency? We're here.