Cookies disclaimer

I agree Our site saves small pieces of text information (cookies) on your device in order to deliver better content and for statistical purposes. You can disable the usage of cookies by changing the settings of your browser. By browsing our website without changing the browser settings you grant us permission to store that information on your device.

CONSULTING & SOFTWARE DEVELOPMENT

Consulting on the software development process with a focus on safety-relevant implementation details, misuse cases and security engineering models - such as Square and SDL

Read More

MOBILE & AUTOMOTIVE SECURITY

Security testing of mobile applications for smartphones, automotive systems or other hardware. Shaping awareness on safety risks, identification of attack vectors and protection of systems

Read More

TRAINING

Learn how to use IT security attack and defense techniques with our 1-3 day workshop in the form of a simulated attack hacker game. The hacker game is tailored to the application and knowledge areas of the participants

Read More

PENETRATION TESTS

Security investigations and controlled attacks of individual computers, specific applications or networks of any size

Read More

Consulting & Software Development

We provide in-house consulting and support for your software development process. The focus is on the development of secure software in an agile context. Proven security engineering models help to find security relevant threats. We work closely with your team and assist with the development and design of software. We recommend the iterative training of security engineering models and security-critical implementations. Consistent security engineering leads to measurably better security.

Threat modeling is a structured approach to document and tackle security threats in software development. Right from the start, our approach ensures that security issues are not lost in the software development process.

iterative security

penetration test

Penetration Tests

Penetration tests are effective and realistic security tests of individual computers or networks of any size. Using controlled attacks, security gaps are revealed and closed.

In the case of black box tests, all information about the target system is acquired by us. Here we use the means and methods that a real attacker would use. In a white box test, however, you tell us how your system works internally. While black box tests are usually more realistic, white box tests offer a very efficient and targeted way to check your system for safety deficiencies.


Mobile & Automotive Security

The area of computer security and the security of embedded systems is changing massively through trends such as IoT and mobile computing. We identify and analyze the behavior of your hardware and software for safety-relevant details. In a conceptual audit, we examine the architecture your hardware and software. Using code audits, we advise your development team of potential problems in your source code and offer suggestions for improvement.

mobile security