Embedded Security

Experts in Embedded Security for the realization of your vision.

With many years of experience in securing systems and software components, we support you with enthusiasm.

Embedded Security Topics

Embedded Software with Security by Design

Embedded Security is Gaining Importance in Many Areas

With enthusiasm and many years of experience, we support you in the certification of various CPU systems and software components. So, among other things, we are also your reliable partner when it comes to implementing your ideas of embedded security in reality. An "embedded system" is understood to mean a self-contained, fixed-functionality information processing system embedded within a large program. In terms of IT security, this means that the specific function of the embedded program is to protect against all potential cyber attacks.

Embedded Security deals with the information security (IT security) of all interconnected or embedded systems. This is done by applying measures against unauthorized manipulation in the procurement, transmission, processing and storage of network information. As an IT expert, it is our job to set up your embedded systems and continuously develop them in terms of security for lasting protection. For while the specific function of embedded security is already known at the time of development and is programmed accordingly, the potential threat of an attack can change over the course of the system's operating time.

Due to the global networking of the digital world, useful value-added services and value-added potential are being created - for example in vehicle technology (autonomous driving), energy supply (smart grid systems), medical technology (telemedicine), office technology (interactive walls) and consumer electronics (smart TV).

At the same time, the increased connectivity also increases the likelihood of potential threats. To prevent this as much as possible, most programmable electronic devices are already factory-provided with an access protection function. In this case, this is referred to as "embedded security", with the access protection function performing the following tasks:

  • the protection of the system from possible cyber attacks
  • the protection of the environment and the system against possible damage resulting from the infringement or restriction of availability, integrity or the degree of confidentiality.

When it comes to programming and setting up such security systems, we are your competent partner. Through security measures, we not only keep the respective functions intact but also optimize them continuously.

This is necessary because reality shows us time and again that absolute protection does not exist. In order to minimize the residual risk that is always present in programs and networks, we offer you our first-class solutions. We regularly train engineers in embedded software development for embedded security and functional security, which allows us to bring countless experiences, knowledge and technologies from over 270 projects and research projects into your project.

Comprehensive Knowledge in Development of Embedded Security

A Certified Security Expert for Your Project

We continuously train engineers in software development for functional safety. The procedures for avoiding systematic weaknesses in embedded security can be taken from the development processes of functional safety and applied. Each team is supported by a certified expert in embedded security. Many experiences, knowledge and technologies from over 270 projects and research projects can be brought together in your project.

Development Process

  • Threat and Risk Analysis
  • Software Lifecycle
  • Process Models
  • Change Management


  • Hypervisor
  • Memory/Space Protection Mechanisms
  • Encryption and Signatures
  • Testing on Target
  • Communication and Protocols
  • Secure Boot Loader Mechanisms

Working Fields

  • Project Management
  • Software Development
  • Verifikation & Validation
  • Component Certification

Mentoring and Training

We support your project from concept inspection to certification by an independent approval body. At all stages we can contribute with experience, tips and tricks to ensure the success of the project.

Certified Platform

With a flexible board support package (BSP) for your hardware, possibly supplemented by an optimized real-time kernel to the requirements of your project, we can work out an individual certified platform for you.

Guarantee and Trust

We are committed from the very beginning to your project and provide you with full support for the realization of your vision. Driven by the enthusiasm of the team work and the fun on the joint success of your project.

System Components

During development of the (sub-)system components we convince with loyal and faithful implementations and pro-active thoughts for the behavior of the component and the security level capability for the overall system.

Experience the integration of our team, based on partnership

Security Software Development

Benefit from our experience in your development. Achieve thus security and reliability in the implementation of your idea up to the certification by an accreditation body.

System Components Outsourcing

You can relieve your team by outsourcing the development of (sub-)systems to an experienced partner. A detailed and personal delivery guarantee seamless integration into the overall system.

Flexibility and Responsibility

In a normal projects, there exist situations where it is necessary to react flexible and creative. We will find a winning solution and you can always rely on our responsibility for the success of your project.

Innovation und Freedom

We are convinced that in a work environment with freedom and transparency is particularly suited to create innovations. We live this way of work every day and would like to impress you with the results.

Projects with ABB according to IEC 61508
Projects with AgaMatrix according to IEC 62304
Projects with AGCO according to IEC 61508
Projects with Airbus according to DO-178C
Projects with Autoliv according to ISO 26262
Projects with BMW according to ISO 26262
Projects with Bosch according to ISO 26262
Projects with Danfoss according to IEC 61508
Projects with EADS according to DO-178C
Projects with Elobau according to IEC 61508
Projects with GE according to IEC 61508
Projects with Grundfos according to IEC 61508
Projects with IFM according to IEC 61508
Projects with Panasonic
Projects with Philips according to IEC 62304
Projects with Samsung
Projects with Schneider Electric according to IEC 61508
Projekte with Sick Stegmann according to IEC 61508
Projekte with Siemens according to EN 50128
Projekte with Trumpf Medical according to IEC 62304
Projects with Valeo according to ISO 26262

You are Interested in Embedded Security ...

Arrange an expert meeting

We offer a free and non-committal interview with one of our experts. We can get to know each other, answer your open questions and also discuss the first requirements of your project.

Related Products and Services

The so-called Flexible Safety RTOS is the real-time kernel with memory protection, pre-certified for applications in the field of functional safety according to IEC 61508, ISO 26262 and IEC 62304

For a first impression of the nature and extent of completed projects, we have put together a small selection for you. For more details read: Reference Projects.