Security is
not a feature.
Security is the foundation. Before we touch a device, the security baseline is in place: MFA, Defender, Conditional Access, email authentication. No compromises, no “we’ll do it later.” All hosted in Germany, fully GDPR-compliant.
How secure is your IT? 10 questions.
Based on BSI baseline protection and NIS2 requirements. Click Yes or No — results update in real time.
Do all employees use multi-factor authentication (MFA)?
Are SPF, DKIM and DMARC configured for your email domain?
Do you use an endpoint security solution (e.g. Microsoft Defender for Business)?
Are Conditional Access policies active (e.g. access only from managed devices)?
Is there automated patch management for operating systems and software?
Are backups created regularly and recovery tested?
Have employees been trained on phishing/social engineering in the last 12 months?
Is there a documented incident response plan?
Is access to sensitive data controlled via a permissions concept?
Are admin accounts managed separately (no daily use with admin privileges)?
Guidance based on BSI baseline protection · not a certified assessment
What we configure for every client first.
Before we touch a device or start a migration, the security baseline is in place. These eight measures are standard in every managed services contract.
Multi-Factor Authentication
For every user, every device. Phishing-resistant via FIDO2 or Microsoft Authenticator. Break-glass accounts for emergencies.
Email Authentication
SPF, DKIM and DMARC fully configured. Nobody can spoof emails in your name.
Microsoft Defender for Business
Endpoint Detection & Response (EDR) on every device. Automated threat response, centralized management.
Conditional Access
Access only from managed devices, only from approved regions, only with current compliance. Everything else is blocked.
Backup with Recovery Testing
Automated backups for Microsoft 365, servers and critical data. Regular restore tests — so backup is more than just a promise.
Patch Management
Updates for operating system, Office and third-party software. Scheduled, tested, no reboots in the middle of the workday.
Security Monitoring
24/7 monitoring of all endpoints. Alerts on suspicious activity — before an attack causes damage.
GDPR Configuration
Retention policies, DLP rules, audit logs. Your IT environment is configured so a GDPR audit holds no surprises.
Secure IT in 4 steps.
Security Audit
We assess your current security posture — identities, devices, email, backup, access rights. Result: a clear report with prioritized risks.
Set the Baseline
Activate MFA, roll out Defender, configure Conditional Access, set up email authentication. In 3–5 days, the foundation is in place.
Hardening
Advanced policies: DLP, device compliance, sensitivity labels, extended audit logs. Tailored to your compliance requirements (GDPR, NIS2).
Monitoring & Review
Ongoing monitoring of all endpoints. Quarterly security reviews with reports and recommendations. No surprises.
What clients want to know about IT security.
What does a security audit from Nomad Solutions cost?+
Is the security baseline included in managed services?+
How long does it take to implement the security baseline?+
Does the security baseline cover NIS2 compliance?+
What happens if a security incident occurs?+
Can you audit existing environments without us becoming managed services clients?+
How secure is your IT really?
In 30 minutes we assess your security posture together \u2014 free, no strings attached.