To experience the full functionality of this website, cookies are needed. Please activate cookies and refresh your browser. After the refresh, a cookie management dialogue will be shown.

This website uses cookies for reasons of functionality, comfort, and statistics. You can change this setting at any time by clicking on “change settings”. If you consent to this use of cookies, please click “yes, I agree”. Our privacy policy




In addition to the well-established requirements from the field of security, there is an increasing focus on the security aspects of embedded systems. These include in particular confidentiality, integrity, and authenticity.

Target-oriented procedure

We face these challenges with you together using a holistic and product-accompanying approach. Our portfolio covers the complete security analysis of embedded systems, as well as the creation of essential security documents. We also advise you on the selection of suitable suppliers for implementing the previously defined objectives, as well as on the execution of the required security tests.

We support you in these areas with recognized and proven solutions in order to provide you with reliable protection against undesired access to your devices. Our experienced associates are also available for sub-areas of our range of services and for retrospective analysis of existing embedded systems.

Our Services:

  • Establishment of security processes in existing development processes
  • Identification of potential attackers, types of attack, and threats
  • Risk assessment
  • Definition of protection objectives
  • Support in the design phase of the secure system
  • Support for supplier selection
  • Accompaniment during various test phases
  • Security analysis of existing products