Sicherheit Header

Secure Software Development according to Common Criteria (EAL4+)

Our Common Criteria certified development process at EAL4+ level makes us specialists in developing highly secure software solutions. Our services cover the entire process, from architecture design and systematic testing to passing attack evaluations at level AVA_VAN.5 (defense-grade).

At a Glance

The CC Components

The evaluation of a software product by the German Federal Office for Information Security (BSI) consists of several core components. Design, documentation, lifecycle management, testing, vulnerability analysis, and threat modeling each have specific requirements depending on the desired certification level.

Threat Model (ASE)

The Security Target (ST) document is the centerpiece of certification. It defines the product’s security functions, their purpose, and how they are implemented.

Design (ADV)

Architecture diagrams, data flow models, API specifications, code documentation, and mapping of requirements to design components.

Testing (ATE)

Test concepts, reports, and cases mapped to security requirements, ensuring repeatability and reproducibility for external evaluators.

Vulnerability Analysis (AVA)

Threat modeling, vulnerability assessments, penetration testing, red teaming, public CVE research, and verification of resistance to common attacks.

Documentation (AGD)

User manuals, installation guides, and administrator documentation (covering secure defaults, password policies, logging guidance, etc.).

Lifecycle (ALC)

Version control (Git), controlled development environments, documented release processes, access control, and secure software delivery.

Our StrengtFhs

As a BSI-evaluated development partner under Common Criteria, we combine extensive security expertise, technological versatility, and deep industry knowledge across all phases of software development.

High-Security Location

Our Siegen facility has been evaluated multiple times by the BSI for various Common Criteria certified software products.

Extensive Experience

Since 2012, we have been developing software according to the highest security standards. From planning and implementation to operations, our processes are fully hardened and evaluated in line with Common Criteria.

Cross-Industry Expertise

We have delivered high-security solutions for industries such as eHealth, banking, and manufacturing, equipping us to handle diverse requirements across various languages and technology stacks.

Your Trusted Partner

We support you through every stage, from consulting and development to long-term operation. We see ourselves as a committed partner and measure our success by your product’s success in production.

This is how we develop your project together

At first glance, a software project can seem very complex. We make your path to your desired software clear and easy to follow. Together, we start with your idea, develop a plan, and implement the solution. We also continue to support you during live operation and help you ensure that the application remains reliable and grows with your requirements.
1
Idea
Is your idea feasible? What costs can you roughly expect? What should you think about? Even before the first line of code, it is important to ask the right questions in order to steer development in the right direction.
Learn more
2
Planning
Create concrete implementation concepts or carry out a proof of concept. Transparent communication, honest answers and an open exchange of opinions are important to us in order to create a robust concept together.
Learn more
3
Development
It's time for the concrete implementation and professional development of your product. Our developers produce clean, efficient code that is both fast and secure.
Learn more
4
Operation
After development, the work really begins. Software needs regular maintenance, updates and also ideas that keep it up to date and performant. We won't leave you alone.
Learn more

Our mission

Always keeping an eye on new technologies, end devices and market developments while networking with research centers and universities. We develop future-proof and platform-independent software based on Open Source components and with a strong focus on security.

Security

Quality means doing the right thing, even when nobody asks. Security is not optional for us.

Learn more

Agility

Agility for you and your projects. Without bloated bureaucracy and unnecessary management, we are quick and accurate in our implementation.

Learn more

Open Source

The Open Source idea is in our blood. When using Open Source in products, we find the right balance between contributing to the community and protecting the client's intellectual property.

Learn more

Transparency

We offer our customers complete transparency from code to time recording.

Learn more

Software service

Challenge? Accepted!

Outstanding services around Software development, support and consulting must provide answers to the six biggest challenges:

Time pressure

Decision-making processes often drag on for weeks and months. As soon as a decision has been made, things have to happen very quickly - you want to see progress as soon as possible (and rightly so!). More resources, more know-how, and quick results are required. Our developers are experienced in throwing themselves into every project without a lot of overhead work and quickly showing visible and yet sustainable results.

Old projects. Old code

Highly specialized programs in particular run quietly in companies for years or even decades. Until an adjustment is necessary - however: Nobody knows who developed the program, where exactly the data comes from or what the program actually does. We help: We analyze, evaluate and familiarize ourselves with the old source code. The code can then be expanded, secured or even completely rewritten in coordination with the partner.

Special security requirements

Secure software development is important to us. We believe that it is not enough to just work through compliance checklists. Criminals, hackers and sometimes competitors are not just theoretical threats. Highly secure software architecture and consistently protected software platforms are our speciality. For us, the requirements can never be high enough.

Permanent development partners

Most of our customers work with us as partners for years. They tell us their wishes and needs, we develop and advise on all topics related to software. Building trust, professionalism and consistently high quality are the pillars of our collaboration. Our lead developers are proud to quickly earn this trust with every new project.

Money Money Money

Lots of colorful features, highly secure development, a fully trained, 24/7 on-call development team and the product live tomorrow, ideally, with a new change every day. If the pot of money were infinite, we would do it without any problems. The reality of our partners is usually different. And we know that very well. We minimize costs right from the start, communicate openly, advise on which features are really necessary, how costs can be reduced by using Open Source, for example, which meetings really have added value and how much documentation is useful.

Let the idea become reality

With software, everything is possible. There are almost no limits to the digital world - the most successful companies in the world (the 'Big Five' such as Apple, Google, etc.) are based on an idea that became reality using software. Our job is to bring your ideas to life.

Ready to take the next step?

With our many years of experience and deep expertise in secure software development, we are your reliable partner from start to finish. Let’s talk about your needs. Together, we’ll develop a tailored, high-security solution that exceeds your expectations.

  • Oliver Schweissgut

    Shareholder and CEO

  • Christian Seewald

    Chief Executive Officer