shadow

About softScheck

Hartmut PohlProf. Dr. Hartmut Pohl
CEO

supports you in methodically developing secure software and firmware – based on recognized industry guidelines such as ‘ISO 27034 Application Security’ and the OWASP Software Assurance Maturity Model or Secure Software Development Life Cycle (S-SDLC, Microsoft).

Our core competencies range from Security Requirements Analysis, Threat Modeling, Static Source Code Analysis, classic Penetration Testing and Fuzzing and Security Testing to Compliance Testing.

In addition, we perform certified Security Test services as an audit partner of TÜV Saarland and DEKRA.

shadow

News

Smarter World Produkt des Jahres 2019 Smarter World price for the product of the year goes to .

Latest Publication

The 10 most common security vulnerabilities in medical devices

Security Testing Medical Devices (Software and Hardware)

Download PDF

Latest Blog post

Zammad Helpdesk: Zero-Day-Vulnerability

During a security test at one of our customers, we came across a web application with integrated helpdesk software. In this context, w...

Read Article
shadow

What our clients are saying

"As long as I require penetration testing, I will be a client of softScheck."

„It was a really very good and pleasant cooperation with your colleagues. I had a lot of fun!“

Axel Koch, Storz Medical AG
Software Development

“softScheck’s customer-orientation is characterized by a high sense of responsibility towards the customer. The consultants were personally available to answer questions even after the security tests were completed.”

Jens Heddrich, Sofort GmbH
IT-Security Officer

“The customer-oriented consultants of softScheck GmbH successfully supported us during the threat modeling of a Java EE application.”

Stefan Krecher, Hannover Re
Software Engineer, IT-Business Solutions
shadow

Security Testing as a Service

Everybody is talking about attacks on IT systems and trying to recognize them. A completely wrong strategy!
Actually vulnerabilities are the root of all evil. Attacks are only successful if they can exploit a vulnerability. Therefore:

Let us improve your security: identifies Zero-Day-Vulnerabilities in every type of software and hardware. We offer „Security Testing as a Service“ in form of a holistic process.

secures your software, firmware, apps and systems, Networks, Server, Router and Gateways and also Blockchains, Smart Contracts, Wallets, dApps, DLT etc. In IoT/Industrie 4.0, SCADA and in general.

shadow

Events

28.09.2022
Medical Device Security Testing (IoT)
In diesem Webinar erläutern wir die Testmethodik, aufbauend auf der MDR, der MDCG und der ISO 27034 von Medizinprodukten.
All Events
shadow

Customers and Partners

Storz Medical AG
netcologne logo
fsp logo
it-sa
ISA
Allianz für Cyber-Sicherheit
openlimit logo
GI
infoteam
bitkom logo
Johner-Institut
Berlin University of Digital Sciences
nrw units
privacy one
kvw