Security concepts for your IoT products

Do you need support in securing your IoT applications against cyber attacks?

We are your part­ner for the secu­ri­ty of IoT devices and are hap­py to help you deve­lop secu­ri­ty con­cepts that are adap­ted to your pro­ducts and ser­vices.

From concept to implementation — Our services at a glance


A work­shop can ser­ve to assess the sta­tus quo, iden­ti­fy poten­ti­al and crea­te the basis for fur­ther con­sul­ting ser­vices.

At a glance:

  • Dis­cus­sion of the most important ques­ti­ons for imple­men­ting a secu­re IoT solu­ti­on in your com­pa­ny
  • Exis­ting initi­al approa­ches, ide­as and con­cepts can be taken up as a basis for dis­cus­sion
  • Iden­ti­fi­ca­ti­on of opti­miz­a­ti­on poten­ti­als for exis­ting solu­ti­ons
  • First non-bin­ding secu­ri­ty assess­ment of the sta­tus quo
  • Defi­ni­ti­on of necessa­ry steps for fur­ther deve­lo­p­ment

Concept creation

Tog­e­ther with you, we deve­lop an indi­vi­du­al secu­ri­ty con­cept for your com­pa­ny that covers pos­si­ble risk sce­n­a­ri­os.

At a glance:

  • Deve­lo­p­ment of a sui­ta­ble secu­ri­ty con­cept
  • Taking up approa­ches deve­lo­ped in the work­shop
  • Working clo­se­ly with PHYSEC experts to com­bi­ne domain know­ledge, tech­ni­cal exper­ti­se and IT secu­ri­ty exper­ti­se


The exact record­ing of the requi­re­ments of the secu­ri­ty solu­ti­on is essen­ti­al in order to ensu­re an opti­mal fit with the indi­vi­du­al app­li­ca­ti­on con­text.

At a glance:

  • Collec­tion of rele­vant requi­re­ments for the sys­tem and for the indi­vi­du­al IT-rele­vant com­pon­ents and inter­faces
  • Lis­ting and descrip­ti­on of func­tio­n­al and non-func­tio­n­al requi­re­ments and bounda­ry con­di­ti­ons in one docu­ment (simi­lar to a spe­ci­fi­ca­ti­on sheet)
  • Defi­ni­ti­on of inter­ac­ti­ve func­tions in the form of use case dia­grams
  • Soft­ware design, con­sis­ting of archi­tec­tu­re, design pat­terns, data struc­tures and algo­rith­ms


As part of the imple­men­ta­ti­on work, we sup­port you in embed­ding the secu­ri­ty con­cept in your cor­po­ra­te envi­ron­ment.

At a glance:

  • Check whe­ther indi­vi­du­al com­pon­ents of exis­ting solu­ti­ons can be used to avoid red­un­dan­ci­es
  • Acti­ve sup­port in the deve­lo­p­ment and use of secu­ri­ty com­pon­ents by the PHYSEC team

Our phi­lo­so­phy is that the team that has accom­pa­nied the imple­men­ta­ti­on work should not be the same team that ulti­mate­ly per­forms the secu­ri­ty ana­ly­ses. The­re­fo­re, we sup­port you in the best case eit­her befo­re the imple­men­ta­ti­onpha­se or alter­na­tively in the ana­ly­sis pha­seto achie­ve the hig­hest pos­si­ble level of pro­tec­tion.

← back to home