Security concepts for your IoT products

Do you need support in securing your IoT applications against cyber attacks?

We are your part­ner for the secu­ri­ty of IoT devices and are hap­py to help you devel­op secu­ri­ty con­cepts that are adapt­ed to your prod­ucts and ser­vices.

From concept to implementation — Our services at a glance


A work­shop can serve to assess the sta­tus quo, iden­ti­fy poten­tial and cre­ate the basis for fur­ther con­sult­ing ser­vices.

At a glance:

  • Dis­cus­sion of the most impor­tant ques­tions for imple­ment­ing a secure IoT solu­tion in your com­pa­ny
  • Exist­ing ini­tial approach­es, ideas and con­cepts can be tak­en up as a basis for dis­cus­sion
  • Iden­ti­fi­ca­tion of opti­miza­tion poten­tials for exist­ing solu­tions
  • First non-bind­ing secu­ri­ty assess­ment of the sta­tus quo
  • Def­i­n­i­tion of nec­es­sary steps for fur­ther devel­op­ment

Concept creation

Togeth­er with you, we devel­op an indi­vid­ual secu­ri­ty con­cept for your com­pa­ny that cov­ers pos­si­ble risk sce­nar­ios.

At a glance:

  • Devel­op­ment of a suit­able secu­ri­ty con­cept
  • Tak­ing up approach­es devel­oped in the work­shop
  • Work­ing close­ly with PHYSEC experts to com­bine domain knowl­edge, tech­ni­cal exper­tise and IT secu­ri­ty exper­tise


The exact record­ing of the require­ments of the secu­ri­ty solu­tion is essen­tial in order to ensure an opti­mal fit with the indi­vid­ual appli­ca­tion con­text.

At a glance:

  • Col­lec­tion of rel­e­vant require­ments for the sys­tem and for the indi­vid­ual IT-rel­e­vant com­po­nents and inter­faces
  • List­ing and descrip­tion of func­tion­al and non-func­tion­al require­ments and bound­ary con­di­tions in one doc­u­ment (sim­i­lar to a spec­i­fi­ca­tion sheet)
  • Def­i­n­i­tion of inter­ac­tive func­tions in the form of use case dia­grams
  • Soft­ware design, con­sist­ing of archi­tec­ture, design pat­terns, data struc­tures and algo­rithms


As part of the imple­men­ta­tion work, we sup­port you in embed­ding the secu­ri­ty con­cept in your cor­po­rate envi­ron­ment.

At a glance:

  • Check whether indi­vid­ual com­po­nents of exist­ing solu­tions can be used to avoid redun­dan­cies
  • Active sup­port in the devel­op­ment and use of secu­ri­ty com­po­nents by the PHYSEC team

Our phi­los­o­phy is that the team that has accom­pa­nied the imple­men­ta­tion work should not be the same team that ulti­mate­ly per­forms the secu­ri­ty analy­ses. There­fore, we sup­port you in the best case either before the imple­men­ta­tionphase or alter­na­tive­ly in the analy­sis phaseto achieve the high­est pos­si­ble lev­el of pro­tec­tion.

← back to home