Cyber Security

Security is important to us because it is prerequisite for the trust between us and our customers.

Our solutions have security built in from the ground up using secure development techniques, as well as security testing by dedicated people. That way the security is embedded in our products and not bolted on as an afterthought.

We Offer

  • Internal and external auditing
  • Risk assessments
  • Threat modelling
  • Product development using SDL
  • User account management
  • Logging management
  • Security training
  • Penetration testing
  • Fuzz testing
  • Intrusion detection
  • Secure boot
  • Hardware & software hardening
  • Crypto hardware support
  • Certificate handling


We know our way around x86, ARM, Power Architecture (PowerPC), FPGA, eFuses and ASICs.

Standards and Regulations

We have years of experience with clients in different sectors and industrial environments. Our clients need to comply with various regulations and, as a result, we have built up a competence for standards such as:

  • NERC
    North American Electric Reliability Corporation standards
  • COBIT 4.1
    Control Objectives for Information and Related Technologies, good-practice framework for IT management and IT governance
  • NIST-800
    National Institute of Standards and Technology, computer security policies, procedures and guidelines
  • ISO27001
    International Organization for Standardization, specification for an information security management system
  • ISO27005
    International Organization for Standardization, information security risk management standard
  • IEC62443
    International Electrotechnical Commission, standards and technical reports that define procedures for implementing electronically secure Industrial Automation and Control Systems (IACS)