
At a Glance
The evaluation of a software product by the German Federal Office for Information Security (BSI) consists of several core components. Design, documentation, lifecycle management, testing, vulnerability analysis, and threat modeling each have specific requirements depending on the desired certification level.
The Security Target (ST) document is the centerpiece of certification. It defines the product’s security functions, their purpose, and how they are implemented.
Architecture diagrams, data flow models, API specifications, code documentation, and mapping of requirements to design components.
Test concepts, reports, and cases mapped to security requirements, ensuring repeatability and reproducibility for external evaluators.
Threat modeling, vulnerability assessments, penetration testing, red teaming, public CVE research, and verification of resistance to common attacks.
User manuals, installation guides, and administrator documentation (covering secure defaults, password policies, logging guidance, etc.).
Version control (Git), controlled development environments, documented release processes, access control, and secure software delivery.
As a BSI-evaluated development partner under Common Criteria, we combine extensive security expertise, technological versatility, and deep industry knowledge across all phases of software development.
Our Siegen facility has been evaluated multiple times by the BSI for various Common Criteria certified software products.
Since 2012, we have been developing software according to the highest security standards. From planning and implementation to operations, our processes are fully hardened and evaluated in line with Common Criteria.
We have delivered high-security solutions for industries such as eHealth, banking, and manufacturing, equipping us to handle diverse requirements across various languages and technology stacks.
We support you through every stage, from consulting and development to long-term operation. We see ourselves as a committed partner and measure our success by your product’s success in production.
Always keeping an eye on new technologies, end devices and market developments while networking with research centers and universities. We develop future-proof and platform-independent software based on Open Source components and with a strong focus on security.
Quality means doing the right thing, even when nobody asks. Security is not optional for us.
Agility for you and your projects. Without bloated bureaucracy and unnecessary management, we are quick and accurate in our implementation.
The Open Source idea is in our blood. When using Open Source in products, we find the right balance between contributing to the community and protecting the client's intellectual property.
We offer our customers complete transparency from code to time recording.
Software service
Outstanding services around Software development, support and consulting must provide answers to the six biggest challenges:
Decision-making processes often drag on for weeks and months. As soon as a decision has been made, things have to happen very quickly - you want to see progress as soon as possible (and rightly so!). More resources, more know-how, and quick results are required. Our developers are experienced in throwing themselves into every project without a lot of overhead work and quickly showing visible and yet sustainable results.
Highly specialized programs in particular run quietly in companies for years or even decades. Until an adjustment is necessary - however: Nobody knows who developed the program, where exactly the data comes from or what the program actually does. We help: We analyze, evaluate and familiarize ourselves with the old source code. The code can then be expanded, secured or even completely rewritten in coordination with the partner.
Secure software development is important to us. We believe that it is not enough to just work through compliance checklists. Criminals, hackers and sometimes competitors are not just theoretical threats. Highly secure software architecture and consistently protected software platforms are our speciality. For us, the requirements can never be high enough.
Most of our customers work with us as partners for years. They tell us their wishes and needs, we develop and advise on all topics related to software. Building trust, professionalism and consistently high quality are the pillars of our collaboration. Our lead developers are proud to quickly earn this trust with every new project.
Lots of colorful features, highly secure development, a fully trained, 24/7 on-call development team and the product live tomorrow, ideally, with a new change every day. If the pot of money were infinite, we would do it without any problems. The reality of our partners is usually different. And we know that very well. We minimize costs right from the start, communicate openly, advise on which features are really necessary, how costs can be reduced by using Open Source, for example, which meetings really have added value and how much documentation is useful.
With software, everything is possible. There are almost no limits to the digital world - the most successful companies in the world (the 'Big Five' such as Apple, Google, etc.) are based on an idea that became reality using software. Our job is to bring your ideas to life.
With our many years of experience and deep expertise in secure software development, we are your reliable partner from start to finish. Let’s talk about your needs. Together, we’ll develop a tailored, high-security solution that exceeds your expectations.

Shareholder and CEO

Chief Executive Officer