About Us

Consulting & Advisory


We provide consulting and advisory in the following areas:

  • Establishing processes and operation concepts
  • Threat analysis and threat modeling
  • Security strategy
  • Public key infrastructure (PKI)
  • Hardware Security Modules (HSM) and Smartcards
  • Security Protocols, e.g. Transport Layer Security (TLS/SSL)

Evaluation & Analysis


If you want to verify a vendor's claims about product features, evaluate open source software components for product integration, or verify security aspects of your own products: We will evaluate, analyze and verify the software. We also provide support for the preparation of a governmental or industry certification.

  • Source code review
  • Static and dynamic analysis
  • Software and hardware reverse engineering
  • Binary-only and blackbox analysis
  • Preparation of documents for certification

Software Engineering


Our areas of special expertise are security aspects of software, communications protocols and cryptography. We create software with quick feedback cycles using an agile process in the following domain:

  • Secure networked systems
  • Applied information security
  • Cryptography theory and practice
  • Highly efficient implementations
  • Security Development Livecycle

Contact Us