Skip to the main content.

3 min read

IT projects don’t fail because of technology – Interview with Achim Büttner

IT projects don’t fail because of technology – Interview with Achim Büttner

Why an IT Project Manager as a Service makes all the difference

Where Companies Struggle with IT Security – and How Project Management as a Service Can Help.

“Technology is rarely the problem – implementation is.” In this interview with Achim Büttner, Solutions Engineer for Secure Data Access at BNC, we uncover the typical stumbling blocks in IT projects, especially in the field of security, and how BNC avoids them. The result: projects that not only run smoothly, but deliver real, lasting value.

 

Planning & Strategy

What should you focus on during early project planning?

All relevant stakeholders need to be involved from the very beginning. Misunderstandings later in the process can only be avoided if goals, roles, and expectations are clearly defined from the start. Just as important: realistic requirements, transparent communication, and reliable planning for time and resources.

How do you ensure that time, budget, and resources are planned realistically?

By being honest in your assessment. It’s better to have open conversations about effort and requirements than to raise expectations with overly optimistic proposals that won’t hold up later. This builds trust from the start and sets the foundation for solid expectation management.

What mistakes do companies often make in security projects?

A common pitfall is skipping the proof of concept. Solutions are often purchased before it's clear whether they truly meet the organization’s needs. That’s why transparency from the start is essential – including a thorough needs analysis before the project kicks off.

 

 

Execution & Collaboration

How do you collaborate with IT managers and CISOs?

By truly understanding their pain points, jointly prioritizing requirements, and having open conversations about options, risks, and effort. What matters most is a partnership-based approach – acting as a sparring partner who translates complex topics into pragmatic solutions.

What matters most in coordinating between BNC, partners, and clients?

Short communication paths, fast response times, and pragmatic solutions. The goal: smooth operations – even in critical situations.

How do you handle delays?

With maximum transparency. Clients always know exactly where the project stands. At the same time, I work to minimize the impact, set clear priorities, and keep the project firmly on track.

Whitepaper: Security Strategy

For more in-depth insights into security strategy, check out our whitepaper: "Building Resilience with the Right Strategy: Setting Up IT Security Effectively".

Read Whitepaper Now!

 

 

 

Customer Value

How do you measure project success?

By balancing time, budget, and quality – and by delivering a solution that works, meets customer expectations, and creates genuine value.

What’s your unique contribution to projects?

I spot potential roadblocks early, offer a fresh external perspective, and work closely with stakeholders to develop sustainable, long-term solutions.

 

Outlook

What trends are currently shaping endpoint and browser security?
  • Ransomware is becoming increasingly sophisticated – double and triple extortion tactics, along with Ransomware-as-a-Service, are now standard practice.
  • AI-powered attacks are evolving rapidly, adapting in real time and evading traditional detection methods.
  • XDR solutions are gaining momentum, thanks to their ability to correlate data across endpoints, networks, and cloud environments.
  • Browser security is taking center stage, with advanced features like upload/download controls and screenshot protection.
  • Context-aware policies and automation are enhancing resilience and enabling faster, more effective incident response.
Advice for IT Leaders: Harmony Endpoint or SASE?

Before making a decision, it’s essential to define your objectives. SASE isn’t a standardized concept – each vendor interprets it differently. Endpoint protection can range from basic antivirus to comprehensive XDR, depending on the provider. My tip: Start by clearly outlining your requirements and use cases. Then evaluate which solution best meets those needs. That’s the only way to create lasting value.

 

 

Achim Büttner

Achim Büttner, Solutions Engineer Secure Data Access at BNC

Achim Büttner brings over 20 years of experience in IT security. After leading an IT team at the German Armed Forces for more than six years, he held roles as a Network & Security Engineer at Endress+Hauser and spent nine years managing the firewall and security infrastructure at Bank Safra Sarasin. He later worked as a Security Engineer and Architect at Swiss IT Security. Today, he serves as Solutions Architect and Head of the Competence Center Network Security at BNC, where he focuses on delivering complex security projects successfully and sustainably.

ab_web_500x500

 

You might also be interested in...

 

Security is no coincidence – it’s strategy.

With over 25 years of experience, BNC supports you in building a tailored security strategy that strengthens your business goals and ensures compliance with regulatory requirements.

 

Security Architecture & Design

Whether it's Zero Trust, hybrid infrastructures, or OT protection – BNC develops robust concepts that sustainably secure your IT and your business. Discover how to future-proof your security strategy!

 

Case: Conforama

Steigern Sie Ihre Wettbewerbsfähigkeit mit zuverlässiger WLAN-Konnektivität

Ein optimiertes Kundenerlebnis, gesteigerte Mitarbeiterproduktivität und eine robuste und sichere Netzwerkinfrastruktur, erfahren Sie, wie Conforama Schweiz den Markt mit erstklassigem Service erobert hat.

When is the right time to develop a security strategy?

When is the right time to develop a security strategy?

A Conversation with Martin Buck, CISO & Head of Consulting Services, BNC AG Key triggers, components, and planning horizons for your security...

Read More
How Security Architecture Prevents a Patchwork Approach

How Security Architecture Prevents a Patchwork Approach

How can I implement IT security measures more efficiently? Why Structure Beats Tool Overload as the Key to Lasting IT Security

Read More
SASE PART 1: POTENTIAL AND LIMITS

SASE PART 1: POTENTIAL AND LIMITS

SASE DECRYPTED, PART 1 LEARN MORE ABOUT THE ADVANTAGES AND DISADVANTAGES OF SASE (SECURE ACCESS SERVICE EDGE) AND HOW COMPANIES CAN DEAL WITH THE...

Read More