Category: Consulting

Blog 2Datacenter EOL

Atlassian pulls the plug: Jira Data Center is being phased out – we’ll guide your journey into the future

Atlassian has announced it will phase out Jira Data Center. Hardly a surprise, but it calls for a clear response. The clock is ticking: as of 28. März 2029, Jira Data Center will be available in read-only mode. From März 2026, no new licenses will be available, and from März 2028 the option to extend […]

Assets Management Mindville Service Katalog

Service Catalog Management for Publishers

Everything is connected! At one of our customers from the publishing industry, we implemented a service catalog together with the IT department. This catalog documents all IT services and provides precise information on all services in operation. All service management processes in the company are supplied with central information through this process – for example, […]

Blog Proforma

ProForma: Forms & Custom Fields for Jira

What is ProForma in Jira Service Management Data Center? How the integrated forms work The news that Jira Service Management Data Center integrates ProForma for free with version 10 changes the way forms are conceived within the platform. What used to be a paid plugin is now available to every company that uses Jira Service […]

Digitalisierung Asset ohne LOGO

Digitalization in public administration: opportunities, challenges, and how Honicon GmbH’s Cyber Security Check helps

A conversation among equals: What digitalization in public administration means today The digitalization of public administration is a central topic for public authorities and companies alike. As part of a recent conversation between Helene Brubrowski and Claudia Plattner, a renowned expert in public-sector digitalization, it became clear: The biggest challenges lie not only in outdated […]

newts

How Tempo Timesheets supports different roles

Companies that use Jira Software (JSW) or Jira Service Management (JSM) often realise early on that the standard functions for recording working times and creating reports are not always sufficient. The need for more in-depth analyses and more adaptable time booking is growing, especially for complex projects or diverse requirements. This is where Tempo Timesheets […]

365JiraInter

Simple integration of Microsoft 365 for Jira in Jira Cloud

Many of our customers use various tools in the company to support and promote employee collaboration. This initial situation showed us how important it is to be able to integrate existing and established tools into the Atlassian world, so we took on the Microsoft 365 for Jira app from Yasoon and tested it extensively in […]

Zwischen NIS 2 und IT-Grundschutz Riskomanagement auf Basis des BSi Standards

What is risk management based on BSI Standard 200-3 in the context of NIS-2 and IT-Grundschutz?

NIS-2 shifts the focus of information security. It’s not just firewalls, patches, or individual technical measures that take center stage, but the management of risks. Legislators and regulators are turning their attention to structures, responsibilities, and how organizations identify, assess, and treat risks. The BSI IT-Grundschutz has provided a framework for this for years. With […]

Mehr Sicherheit per Gesetz Bundestag verabschiedet NIS 2 Umsetzung

More security by law: Bundestag passes the NIS 2 Implementation Act

ℹ️ tl;dr On 13 November 2025, the Bundestag transposed the NIS 2 Directive into German law without transitional periods. The BSI Act (BSIG) is comprehensively redrafted: expanded catalogue of obligations, central risk management, supply chain security, and strict reporting duties. The scope is greatly expanded and covers significantly more companies, suppliers, and authorities at the […]

Blog 1Bercon 2

Sustainable Permission Models for Confluence

Permission chaos in Confluence When multiple teams and departments in a company access Confluence at the same time, things can quickly descend into a confusing tangle of permissions: too many administrators, unclear responsibilities, and pages that are no longer findable or are accidentally visible to unauthorized people. This can lead to serious problems: suddenly, confidential […]