Central phone number
Feel free to contact us!

+49 371 2371-0


Central fax number
Feel free to contact us!

+49 371 2371-150


Support hotline
We answer your questions

+49 371 2371-250

Send an email

IT security & infrastructures

Analysis of IT vulnerability

IT security is more important in companies than ever. More and more complex data must be protected. Open, Internet-based systems increase efficiency, but are also potential ways to access sensitive data. With our IT vulnerability analysis, we support you by taking an unbiased look at your IT infrastructure and critically examining it for security gaps and weaknesses.

Thus, we contribute to the improvement of IT security and promote the protection of your IT infrastructure in general and critical company data in particular.

Our offer for IT vulnerability analysis

Together with you, we clarify the following questions in the context of an IT vulnerability analysis:

  • Is your company best possible protected against threats such as current hacker attacks?
  • Are there possibly old partnerships that still have access to the network ( e.g. via VPN )?
  • How secure is your WiFi network currently?
  • Where is your sensitive data located?

These and other questions often get lost in the operative business. As an external IT service provider we offer a neutral view of your IT network and identify weak points before they are detected and exploited by third parties.

Increase your IT security by deciding to carry out an IT vulnerability analysis!

Weakness detected?

Were vulnerabilities detected? To make your business critical data and IT infrastructure as secure as possible, we offer you a comprehensive portfolio of IT security solutions - both hardware and software.

The IT System Audit

If you want to put your IT system to the test, we recommend our IT system audit.
It includes the following services:

  • Detailed interview with your IT manager
  • As-is analysis
  • Derivation and prioritisation of recommendations for action
  • Joint planning and implementation
  • Success control
  • Audit report with seal of approval

learn more...

 

SIGMA Bot IconSIGMA bot
IT security & infrastructures

Welcome to the SIGMA Chatbot!

Thank you for using our chatbot. Our chatbot is here to answer your questions and provide solutions. Here are some instructions for use:

1. Asking questions

Pose your question directly in the chat window. Our chatbot utilizes comprehensive data knowledge derived from one of our internal databases and text documents containing marketing information about products and services of the SIGMA Group, enabling the chatbot to provide you with detailed answers

2. Providing feedback

After the chatbot has responded, you have the option to rate the answer. This helps us understand how well the chatbot responds to different inquiries. Provide feedback on whether the answer was helpful or not.

3. Contacting the sales team

If the chatbot cannot provide a satisfactory answer, you have the option to send a request directly to our sales team from the chatbot window. We will assist you personally.

4. Email forwarding

If you wish to end the conversation with the chatbot or receive information via email, the chatbot offers the option to forward the conversation via email. Simply click "Send answer via email," enter your email address, and a few seconds later, the conversation with our SIGMA chatbot will be forwarded to your email address.

5. Chatbot optimization

We value your feedback! Ratings help us continuously improve and optimize the chatbot. Let us know what you like and where we can further improve. Feel free to send your feedback via email as well - marketing@sigma-chemnitz.de.

Thank you for using our chatbot. We hope it can effectively assist you with your concerns. If you have any further questions, we are here to help.

Privacy Information for Users of Our SIGMA Question Bot (Privacy Policy)

Use of Chatbot

(1) This website uses a chatbot developed exclusively by us. The chatbot is a software-based dialog system that enables text- or voice-based communication with a technical system.
The chatbot operates on the RAG (Retrieval-Augmented Generation) approach, retrieving data from a database to answer questions as accurately as possible. These data, along with the user’s question, are sent to the language models of OpenAI, Inc. without transmitting any personal information about the user. The models attempt to answer the question using the provided data and return the response. The data are sourced from one of our internal databases, comprising text documents with marketing information about products and services of the SIGMA Group.

(2) The following data are processed: session ID for user requests, the time of the request, the request itself, the chatbot’s response, the topic, and the language.

(3) We process this data to analyze the productivity of our chatbot and to continuously improve it. This includes the following purposes:

  • Chatbot performance optimization: We collect and analyze interactions with the chatbot to evaluate its efficiency and performance. This includes, for example, questions the chatbot could not answer, repeated inquiries on specific topics, and similar issues.
  • Enhancing the user experience: We use data to improve the user experience. This includes analyzing user feedback to make adjustments and expansions to the chatbot to better meet your needs.
  • Error detection and resolution: The data allow us to detect errors and issues in real time, enabling faster resolution and updates to the chatbot.
  • Statistical evaluations: We generate aggregated, anonymized statistical reports on chatbot usage. These reports contain no personal information and serve to analyze trends and patterns.

The legal basis is Article 6(1) Sentence 1 lit. f GDPR.

SIGMA Bot Icon

Hello! I’m the SIGMA Question Bot, and I’m happy to answer your questions about IT security and infrastructure.

Contact us
Topic
I am the
SIGMA Question Bot.
I can help you at lightning speed.