BLOG

A look behind the scenes at TEAL

  • All
  • Services
  • Gastbeiträge
  • Lessons Learned
  • SAE
  • Further Topics

Our Managing Director and Security Architect, Fabian Böhm, was recently on the Stegmann and Company podcast "Bits and Bytes" with Alexa Dippold and talked about this often neglected topic. And the key message is...

In this article, we give you a closer look at the importance of Microsoft Tiering for your IT security. We have looked at the underlying issues and the critical areas and systems that need to be protected to prevent total loss ...

This year we will be represented for the first time together with our partner FB Pro GmbH with a stand and a specialist lecture at one of the most important IT security trade fairs in Europe: it-sa 2024 in Nuremberg...

Today we want to take a look behind the scenes of our security assessment, but what is it anyway? In a nutshell, we enable you to make informed decisions and base your next steps on a solid, risk-aware foundation....

How MS Exchange on-premises compromises Active Directory and what organizations can do to prevent that. SpecterOps recommends their customers establish a security boundary around their most critical assets (i.e., Tier Zero) of Active Directory (AD). ...

Together with one of our partners FB Pro, we will be at stand 58 in the Eilenriedehalle in the Hannover Congress Centrum. Our focus will be on a central topic that is of crucial importance in the cyber security world: system hardening...

Since 2021, we have been offering our customers not only pure IT security consulting, but also a fully comprehensive managed service for our products. Above all, we have focussed on the topic of system hardening with the Enforce Administrator product...

2023 was a year full of successes and, above all, team spirit for TEAL. As an IT security company, we not only focus on the security of our customers, but also on the well-being of our own team. In this year in review, we would...

We will participate with TEAL in our first recruiting fair, respectively in our first Career Day at the Ruhr University Bochum - and of course we hope to meet many potential candidates and possibly future trainees for TEAL there!...

The pace of advancement and proliferation of AI technology has now increased tremendously. In the few weeks alone since the last blog on this subject...

No, in the second part we will not have another interview with ChatGPT and admire at its capabilities. This time we will look at the development and possibilities of AI in general and venture a glimpse into the future, which in the IT world will...

In this interview, we offer you the opportunity to get to know an experienced Microsoft trainer and benefit from his expertise. In the interview with Lisa Werner from Teal, Torsten Fischer talks about his professional roots ...

This year we have successfully implemented many projects together and worked out individualized solutions & concepts. Therefore, we would like to say thank you to our customers and partners in this post. We wish you happy holidays, a reflective celebration and a happy new year...

In this blog article, we would like to discuss how easy it is to try BloodHound Enterprise and get convinced of its numerous benefits. We will explain what requirements...

We started our trainee program at Teal about 1.5 years ago and have so far trained or are about to train a total of six trainees as IT security experts in three six-month intervals. From August, our fourth run will begin and two new colleagues...

We are celebrating five years of TEAL with our team this month. Five years packed with constantly evolving know-how in customer work, internal projects and continuous growth of the company. With an increasing growing team and great customer projects, we have been able to develop...

In our blog post for this month, we look at the topic of user lifecycle processes. In every company, employees come and go, employees get married, go on parental leave, or get sick. You'd think that user lifecycle processes would be in place at every...

This year we have successfully implemented many projects together and worked out individualized solutions & concepts. Therefore, in this post we would like to say thank you to our customers and partners. We wish you happy holidays, a reflective celebration and a happy new year!...

Our blog post for this month deals with a topic that is not directly related to information security. Nevertheless, this topic should not be underestimated and neglected. It is about the automated installation of Windows Server in the enterprise....

In our last article of the “(E)SAE Deep Dive” series, we would like to look at the topic of system hardening today. Operators of critical infrastructures (CRITIS), for example, must ensure that “the state of the art” is implemented. This of course...

Already some time ago we started with our Naked TEAL campaign an initiative to remain one of the most attractive employers in consulting. A cornerstone of this journey is to hear what is important to our team a...

We are currently working on the next internal project, which we will report on in detail in due course. Until then we will blog at irregular intervals about technical stumbling blocks and their solution....

This month we would like to present you the promised version 2 of ContactAdder. What the ContactAdder is all about, you can read in part 1. In this release, we wanted to automate the execution of the script...

This month we would like to provide you with a small tool, which we have developed for internal use. We use Office 365 for collaboration. Each of our employees has a mobile phone, either IOS or Android. ...

Welcome to the fifth part of our ESAE series. In this part, we would like to focus on an area that is not covered so comprehensively on the Internet - Windows IPSec. "IPsec (short for Internet Protocol Security) is a...

In the blog category "Secure Administration Environment" we want to share our experiences from customer projects around Microsoft's Enhanced Security Administration Environment ...

We already explained in detail in our blog a few months ago that it is absolutely necessary to harden systems. In this article, we would like to discuss some of the most common stumbling blocks that we have encountered on customer projects. ...

When we published a blog post on Enhanced Security Admin Environment (ESAE) Retirement in early 2021, we had no way of knowing that it would become one of the most-read articles. Reason enough to reassess the situation a year later and reflect our current view....