Our services

A security partner from requirement elicitation to testing

 

ITK’s security portfolio is closely aligned with existing standardization activities such as ISO/SAE 21434 and IEC 62443. In this section, we show the generic security services that are relevant in all industry sectors.

Our services

A security partner from requirement elicitation to testing

 

ITK’s security portfolio is closely aligned with existing standardization activities such as ISO/SAE 21434 and IEC 62443. In this section, we show the generic security services that are relevant in all industry sectors.

Ignition-phase security services

Cybersecurity
CheckUp
How secure is your product/company?

.

Baseline
Concept
How to make your architecture „security-ready“?

Product security services

Risk
Assessment
What does „secure“ mean in my system?
Software
Development
How to implement security mechanisms securely?
Concept
Consulting
Which security mechanisms have to be put in place?
Cybersecurity
Testing
Are there attack vectors that were missed?

Enabler service

Cybersecurity
Training
How to enable your company to deal with security?

.

Process
Consulting
How to establish a security process in your company?

info security  Aligned with IEC 62443 & ISO/SAE 21434 Draft

Ignition-phase

security services

Cybersecurity
CheckUp
How secure is your product/company?

.

Baseline
Concept
How to make your architecture „security-ready“?

Product security

services

Risk
Assessment
What does „secure“ mean in my system?

Security Goals

Concept
Consulting
Which security mechanisms have to be put in place?

Security Concept

Software
Development
How to implement security mechanisms securely?

System

Cybersecurity
Testing
Are there attack vectors that were missed?

Enabler service

Cybersecurity
Training
How to enable your company to deal with security?

.

Process
Consulting
How to establish a security process in your company?

info security  Aligned with IEC 62443 & ISO/SAE 21434 Draft

Insights into our services

Get to know our various offers

Insights into our services

Get to know our various offers

Cyber Security Checkup

In many cases, our customers are not sure where their products stand in terms of security. It is obvious that security is important, but it is unclear how much to invest in security, where to start or how to proceed.

Baseline Concept

Timelines are often tight, and decisions have to be made quickly to reduce time-to-market. At the beginning of designing a system, initial architecture and hardware decisions need to be made.

Risk Analysis

“What does ‘secure’ mean?” – a question that needs to be answered in every security engineering project. ‘Security’ is context-specific: while confidentiality is an important protection goal for passwords, it certainly is not needed for public news.

Concept Consulting

“Which security mechanisms have to be applied to make the system ‘secure’?” – this is the question that has to be answered once the meaning of ‘secure’ has been defined for the target system.


null
Concept Review

Testing the security of a system is challenging. It’s not about testing whether the product “works”, but testing whether imaginable attacks fail.

Software Development

Software vulnerabilities can easily jeopardize the security of the system, even if its security concept and specification is bulletproof.

Code Analysis

Software has to be tested to be reliable – the same applies to software security. A distinction can be made between functional security testing and non-functional security testing.

Fuzz Testing

Code analysis tools can only identify specific types of vulnerabilities and often software or entire systems are too complex to be manually reviewed.

Penetration Testing

Engineers are human beings who can make mistakes. These mistakes can happen in each development step but also during integration.

CyberSecurity Trainings

Central to our work is the enablement of our customers. In addition to engineering projects and consulting tasks, we also build up the customer’s security expertise and awareness.

Process Consulting

While bringing security into products is the first step on the road to push cybersecurity into a company, establishing cybersecurity processes and methodologies are required to get reproducible results.

Need something special?

Contact us today. Our experts will take care on your project and find the best solution.

security

Cyber Security Checkup

In many cases, our customers are not sure where their products stand in terms of security. It is obvious that security is important, but it is unclear how much to invest in security, where to start or how to proceed.

security

Baseline Concept

Timelines are often tight, and decisions have to be made quickly to reduce time-to-market. At the beginning of designing a system, initial architecture and hardware decisions need to be made.

security

Risk Analysis

“What does ‘secure’ mean?” – a question that needs to be answered in every security engineering project. ‘Security’ is context-specific: while confidentiality is an important protection goal for passwords, it certainly is not needed for public news.

security

Concept Consulting

“Which security mechanisms have to be applied to make the system ‘secure’?” – this is the question that has to be answered once the meaning of ‘secure’ has been defined for the target system.

security

Concept Review

Testing the security of a system is challenging. It’s not about testing whether the product “works”, but testing whether imaginable attacks fail.

security

Software Development

Software vulnerabilities can easily jeopardize the security of the system, even if its security concept and specification is bulletproof.

security

Code Analysis

Software has to be tested to be reliable – the same applies to software security. A distinction can be made between functional security testing and non-functional security testing.

security

Fuzz Testing

Code analysis tools can only identify specific types of vulnerabilities and often software or entire systems are too complex to be manually reviewed.

security

Penetration Testing

Engineers are human beings who can make mistakes. These mistakes can happen in each development step but also during integration.

security

CyberSecurity Trainings

Central to our work is the enablement of our customers. In addition to engineering projects and consulting tasks, we also build up the customer’s security expertise and awareness.

security

Process Consulting

While bringing security into products is the first step on the road to push cybersecurity into a company, establishing cybersecurity processes and methodologies are required to get reproducible results.

security

Need something special?

Contact us today. Our experts will take care on your project and find the best solution.