We keep you up to date

securing your business

Stop email data loss with AE DLP

How Adaptive Email DLP detects contextual risks and prevents email data loss…
Co-CEO Stephan Hungerbühler (left) and Co-CEO Philipp Oesch (right) shaking hands during the change in Asecus' management team.

Change in management

Asecus announces change in leadership: Co-CEO Stefan Hungerbühler hands over…

Firewall rules under control?

How you can ensure transparency, control, and compliance in complex network…

Senior Security Consultant 100% – Uster

Du erstellst Security Strategien und Konzepte für unsere Kunden...
Person taps a virtual SASE icon surrounded by icons for security, network, cloud, and data protection.

SASE overview – an introduction

A cloud-based approach that combines network and security functions …
View of Earth from space with glowing data streams orbiting it. In the foreground, the letters “SD-WAN” are displayed in large white letters.

From WAN to SD-WAN: More Agility and Security

SD-WAN is a forward-looking alternative that enhances traditional WANs with…
Digital illustration of a stylized blue cloud with conductor track and circuit design on a background of binary code and network connections.

Microsoft discontinues Default Outbound Access in Azure

Azure customers who previously relied on Default Outbound Access must implement…
Person interacting with tablet while icons for password, fingerprint, credit card, smartphone, and network security are displayed – focus on digital authentication and cybersecurity.

ZTNA: The secure alternative to the classic VPN

The Zero Trust Network Access (ZTNA) approach offers a forward-looking alternative…

Secure your cloud environments

Find out more about how we can help you make your cloud environments more secure…

Success Story: Cantonal Hospital Glarus

With the support of Asecus, the Cantonal Hospital Glarus (KSGL) has significantly…

Better user security with SASE architecture

SASE provides a comprehensive and integrated security architecture specifically…

Successfully Combat Cyber Risks With SOC Services

Find out more about our Managed Security Operations SOC services such as Managed…
ransomware cyber security board of directors

IT security on the board of directors

Ransomware remains one of the top threats for companies. But IT security is…
endpoint-security-epp-ndr-xdr-ransomware

Have antivirus-solutions become obsolete?

A lot has happend in the field of endpoint protection in recent years.
Log4j vulnerabiliy scan

Log4j Vulnerability

Cyber criminals are already actively exploiting the vulnerability to infect…

Zero-Day Exploit – Java Library Log4j

Critical Zero-Day Exploit Log4Shell...
Mann sitzt vor Computerbildschirm mit Ransomware-Warnung – persönliche Dateien verschlüsselt, Lösegeldforderung mit Countdown

Ransomware Readiness Check

Are you prepared for a Ransomware Attack? Find out now!
Container am Hafen – Container Security Consulting für sichere Container-Infrastrukturen in der Schweiz

Container Security

Asecus supports you in securing your containers from the concept phase to the…
Microsoft Teams auf Smartphone – Microsoft 365 Security Consulting Schweiz

Microsoft 365 Security

Asecus supports you in securing your Microsoft 365 environment from the concept…
IT Security Consultant

Cloud Security Consultant

You're developing cloud services for our customers and act as a "trusted advisor"…
Current IT Security job offers

Security Engineer

You design and implement security solutions for our customers and are willing…
IT-Security-Workshop – Experte präsentiert Cybersecurity-Strategien im Unternehmensmeeting

Sales & Account Manager

As a sales and account manager at Asecus, you maintain a close customer relationship…
IT-Spezialisten analysieren Cloud-Sicherheitslösungen im Rechenzentrum – On-Premises und Cloud Security Consulting

Cloud Security

Asecus has built up a dedicated Cloud Security Team over the past years that…
IT-Security-Workshop – Experte präsentiert Cybersecurity-Strategien im Unternehmensmeeting

Security Consulting

Asecus gibt Ihnen eine ganzheitliche Sicht auf ihre Bedrohungslandschaft, dadurch…