Skip to main content
search

IT Security in Practice

22. August 2025 Technology

Companies face the ongoing challenge of protecting their systems against external attacks and internal risks. With increasing threats and rising regulatory demands, relying solely on isolated checks or individual security measures is no longer sufficient. A holistic security approach is essential. Let’s take a closer look at the key components of IT security.

Security Audits and Penetration Testing for Maximum Protection

One of the central tools in IT security is conducting regular security audits. These systematic assessments uncover vulnerabilities and test the resilience of applications and infrastructure against potential attacks. Of particular importance are penetration tests, which can be carried out under different scenarios:

  • Black-box tests simulate external attacks without prior knowledge. Testers receive no internal information beforehand, recreating potential threats as realistically as possible.

  • White-box tests involve full system knowledge. Code, architecture, and configurations are analysed to identify hidden weaknesses.

Combining both methods ensures a comprehensive view of possible vulnerabilities. For companies, this provides a complete security picture and the opportunity to address critical issues proactively.

How ADITUS Ensures Independent Testing

Our Visitor Portal v5 and Identity Provider underwent an extensive assessment by the independent provider Turingpoint, including both black-box and white-box testing. The result: a flawless risk summary – demonstrating the care and precision we invest in securing our systems.

 

Continuous Monitoring: Security Information and Event Management (SIEM)

While audits provide valuable point-in-time insights, continuous monitoring is crucial for maintaining security. This is where Security Information and Event Management (SIEM) comes into play. A SIEM system continuously collects data from multiple sources – such as log files, user activities, and network access – and correlates the information. Instead of viewing isolated events, the SIEM provides a complete picture of system activity. Whenever suspicious patterns are detected, the system immediately raises an alert.

Key benefits include:

  • Early detection of irregularities in real time.
  • Support in meeting compliance requirements, including ISO 27001 and GDPR.
  • Centralised access to all relevant data for precise incident analysis.

SIEM in Action

We actively use SIEM to detect suspicious patterns at an early stage, allowing us to mitigate potential threats before they become critical.

 

The Human Factor: Awareness and Training Against Phishing

Technische Systeme sind wichtig, doch die größte Schwachstelle in der IT-Sicherheit bleibt der Mensch. Angreifer:innen nutzen Täuschung, um Zugangsdaten oder sensible Informationen zu erlangen. Um dem vorzubeugen, sind Aufmerksamkeit und Bewusstsein entscheidend, sodass Mitarbeiter:innen verdächtige E-Mails zuverlässig erkennen und angemessen darauf reagieren.

While technical solutions are essential, the greatest vulnerability in IT security remains the human factor. Attackers increasingly rely on deception to obtain login credentials or sensitive information. Raising awareness and vigilance is key, helping employees to identify suspicious emails and respond appropriately.

Employee Training as Part of the Security Strategy

Our security strategy includes regular training sessions designed to raise awareness of phishing attempts and equip employees to recognise them.

 

Patch Management: Applying Updates Without Delay

Another critical element of IT security is patch management. Unpatched systems are among the most common entry points for successful attacks. Hackers often exploit known vulnerabilities in operating systems or applications that could have been resolved with timely updates. Best practices recommend clearly defined timelines and streamlined processes to ensure security updates are applied quickly. Automation plays a key role in preventing delays.

Automated Update Processes at ADITUS

We deploy all security-related updates automatically and without delay:
• End-user devices: Operating system updates are installed within 48 hours.
• Servers: New updates are rolled out within seven days.
• Emergency patches: Prioritised and deployed immediately after internal assessment.

 

Secure Infrastructure: Data Centres with Maximum Protection

In addition to software and processes, physical infrastructure is a critical part of IT security. Modern data centres must not only deliver powerful systems but also adhere to the highest security standards. These include multi-level access controls, fire protection, redundant power supply, and intelligent climate management. Such measures ensure availability and security even under exceptional conditions.

Hosting in a High-Security Data Centre

Our systems are hosted at the high-security data centre of noris network AG in Nuremberg – one of the most advanced facilities in Europe. Transponder cards, biometric authentication, video surveillance, inert gas fire suppression, and redundant power and climate control systems guarantee maximum protection.

 

Administrative Access: Privileged Access Workstations (PAWs)

Administrative access represents one of the most sensitive areas within any IT infrastructure. To ensure the highest level of security, we rely on Privileged Access Workstations (PAWs) – dedicated, isolated environments used exclusively for administrative activities. This approach ensures strict control and traceability when accessing critical systems.

Privileged Access Workstations in Practice

At ADITUS, all sensitive administrative tasks are performed using PAWs, guaranteeing compliance with the highest security standards.

 

Security as a Continuous Process at ADITUS

IT security is an ongoing process. As systems, threats, and regulatory requirements evolve, security strategies must adapt accordingly. That’s why we conduct automated, weekly security tests across our solutions, continuously analysing and evaluating the results.
For maximum transparency, we publish the results in our Release Notes every three weeks in the ADITUS Customer Area. By doing so, we demonstrate that security is not just a requirement but an integral part of our quality promise – giving our customers the confidence that their data and systems are in safe hands.

zurück zum Blogback to the blog