"Human behavior cannot be compensated for by technical measures alone."
Raising employee awareness on security issues is a fundamental component of nearly all security concepts. Against this background, we offer a wide range of trainings and workshops.
Inquiries
This email address is being protected from spambots. You need JavaScript enabled to view it.
Data protection is more important today than ever before, and companies of all sizes and industries must ensure strict compliance with the General Data Protection Regulation (GDPR). Even seemingly minor violations can have serious consequences.
An external Data Protection Officer (DPO) is an effective way to demonstrate that your organization complies with legal requirements and that your data is collected and processed securely, in accordance with the GDPR. Our team of experienced data protection experts provides comprehensive support and advice on all matters related to data privacy.
As your external DPO, we take responsibility for all aspects of data protection in your company—from monitoring data processing activities to training your employees. With our external DPO services, you can prove compliance with data protection regulations. Contact us to learn more about how we can help you improve data protection in your organization.
Inquries
This email address is being protected from spambots. You need JavaScript enabled to view it.
We develop customized solutions tailored precisely to your requirements.
It’s usually not about “reinventing the wheel,” but about developing a concept from the many systems and devices available in the security domain—one that is precisely tailored to your specific needs. If necessary, we’ll also develop a completely new system or a custom device—just for you.
Inquiries
This email address is being protected from spambots. You need JavaScript enabled to view it.
Viele Milliarden Geräte und Produkte sind mit dem Internet verbunden. Die Zahl der IoT Devices steigt unaufhaltsam. Vernetzte Geräte sind ein beliebtes Ziel für Cyberkriminelle. Doch auch Fehlfunktionen können zu weitreichenden Ausfällen und hohen Kollateralschaden führen.
Challenges
At the EU level, efforts are underway to establish a minimum level of cybersecurity in consumer IoT products. Starting in August 2025, all internet-enabled devices falling under the Radio Equipment Directive (RED) must comply with minimum security standards according to EN18031-x to receive a CE marking. Without proper proof of compliance, IoT devices may no longer be placed on the EU market.
Solutions
We support you in the development of cyber-secure IoT hardware — through in-house workshops, development-accompanying consulting, or individual support. In addition to conveying a solid understanding of the standards, we show you effective paths to successful product certification.
Our Services for You
IoT Security Evaluation
IoT Security Concept Development
Consulting on the RED (Radio Equipment Directive)
Consulting on EN18031-x
Consulting on ETSI/EN303645
Consulting on BSI IT Security Label / EUCC
Preparation Workshops
RED Crash Course – 2-Day Inhouse Training
Intensive Development-Accompanying Consulting
Design Checks
Internal Pre-Certification Audits
Document Review
IoT Device Testing
Selection of Certification Bodies and Test Registration
Guidance from Product Idea to CE Marking / EU Certification Badge
Inquiries
This email address is being protected from spambots. You need JavaScript enabled to view it.
With Industry 4.0, the networking of machines and systems has become widespread across industrial manufacturing in all sectors. Industrial automation, manufacturing robots, CNC machines, conveyor belts, packaging machines, production systems, and operational data collection—as well as printers, scanners, smart lighting systems, building automation, technical building management (GLT), and HVAC—the interaction of these connected systems is becoming increasingly complex.
Challenges
Here, often robust, conservative technology with long life cycles in established structures meets the ever-accelerating demands of a digital society. OT is not IT.
Nevertheless, both the systems and networks must be effectively protected against intrusions, manipulation, and malfunctions—while ensuring effective data exchange within production without data leakage and with sensible manageability.
Unfortunately, the numerous (and often unnecessary) incidents of attacks on company networks via OT show that these fundamental measures are frequently not sufficiently implemented in practice.
Solutions
We support you in designing and implementing a secure network infrastructure for your production environment. Our approach is holistic and takes into account your established company infrastructures. This includes not only solid future-proof concepts but also the economical continued operation of legacy systems.
“We’ve been doing OT before the term even existed.”
With our many years of experience in various areas of industrial networking and security, we are at your side to successfully secure your production facilities and processes.
Our Services for You
OT Security Evaluation
OT Security Concept Development
Securing Legacy Systems
OT Network Architecture
Integration of trades/services such as energy management
Compliance checks according to relevant standards like EN62443-x
Consulting on machine regulation questions
“We were doing OT before the term even existed.”
Inquiries
This email address is being protected from spambots. You need JavaScript enabled to view it.