Business SegmentExplanation/Definition
Electrical engineering
Plant engineering

Drawing circuit diagrams for switch cabinets, also refer to CAE.

Electrical installation
Plant engineering

Electrical installation is the installation or the assembly of prefabricated compounds to mount a technical installation.

Endpoint protection
IT solutions

Endpoint protection describes the measures taken and regulations met to protect all end devices with access to a network against detrimental attacks by third parties. 

Why endpoint security?
Proven protection measures, such as antiviral software or firewalls, meanwhile have turned out to be mostly ineffective if the cyber attacks take place via the end devices of the individual users, what according to experts is the fact in more than two thirds of the attacks. Affected end devices (clients) are for instance:

  • PCs
  • notebooks
  • smartphones
  • tablets
Energy management
Production control

Energy management is designed to increase the efficiency of the energy (electricity, gas, oil, compressed air, etc.) used in production and to reduce energy consumption. Another part of energy management is the planning of resources regarding peaks in current consumption. The manufacturing execution system supports the operating party in the detection and management of measuring points and in the assignment of consumptions to products, raw materials, and production orders and in the corresponding reporting.

Enterprise content management
IT solutions

Enterprise content management (in short: ECM) comprises of methods, techniques, and tools to detect and control contents and documents to support organisational processes in the company. ECM components and methods can be to:

  • capture
  • manage
  • store
  • preserve
  • deliver
Enterprise resource planning
IT solutions

The enterprise resource planning supervises and manages all flows of goods in the company regarding time, quality, and quantity.

Also refer to: ERP software

ERP software
IT solutions

Enterprise resource planning is about the coordination of production factors, such as capital, human resources, operating supplies, or materials, and is designed to continuously optimise and simplify the processes of value creation in the company.

Exploit prevention
IT solutions

Exploits are a particular kind of malware. They contain data or an executable code which make use of one or more security flaws in the software running on a PC.

Web browsers, Flash, Java, and Microsoft Office are among the most frequently attacked ones. As they can be found everywhere, security experts and hackers actively search for security flaws.

The developers have to publish regular patches to eliminate security flaws. Such patches should be installed immediately upon publishing; however, this is not always done because you have to close e.g. all browser tabs or open files to update the device. Another issue are exploits for security flaws so far unknown which hackers find and use. These are so-called Zero-Day-Exploits. It can take a while until manufacturers get to know about the problem and solve this.

Your contact to OAS AG

Are you interested in more information about OAS AG? Do you want to ask for a quotation? Do you have questions about one of our business segments? Or do you need support on your hardware, software, or infrastructure? Please do not hesitate to contact us. We will be pleased to help you!