shadow

About softScheck

Hartmut PohlProf. Dr. Hartmut Pohl
CEO

supports you in methodically developing secure software and firmware – based on recognized industry guidelines such as ‘ISO 27034 Application Security’ and the OWASP Software Assurance Maturity Model.

Our core competencies range from classic Penetration Testing and Security Testing to Compliance Testing.

In addition, we perform certified Security Test services as an audit partner of TÜV Saarland.

shadow

News

Latest Publication

Latest Publication

What about Security in DLT, blockchain and components like dApps, smart contracts, wallets, frameworks?

Download PDF

Latest Blog post

Deobfuscating VBA & PowerShell Scripts of an Emotet Trojan Downloader

We analyzed a recent wave of phishing mails trying to spread the <a href="https://securelist.com/the-banking-trojan-emotet-detailed-analy...

Read Article
shadow

What our clients are saying

"As long as I require penetration testing, I will be a client of softScheck."

“We had our IGW / 922 VPN remote access gateway router tested by the IT security experts of softScheck, using both penetration testing and the fuzzing of specific network interfaces. We would like to thank softScheck for their excellent work and will continue to rely on them in the future. “”

Klaus-Dieter Walter, SSV Software Systems GmbH
CEO

“High-quality expertise and a customer-oriented frankness make softScheck a preferred partner for the security tests of our Airlock Suite. We will continue to cooperate with softScheck in the future.”

Erwin Huber, Ergon Informatik AG
Director of Product Development Web Application Security

“The customer-oriented consultants of softScheck GmbH successfully supported us during the threat modeling of a Java EE application.”

Stefan Krecher, Hannover Re
Software Engineer, IT-Business Solutions
shadow

Security Testing as a Service

Everybody is talking about attacks on IT systems and trying to recognize them. A completely wrong strategy!
Actually vulnerabilities are the root of all evil. Attacks are only successful if they can exploit a vulnerability. Therefore:

Let us improve your security: identifies Zero-Day-Vulnerabilities in every type of software and hardware. We offer „Security Testing as a Service“ in form of a holistic process.

secures your software, firmware, apps and systems, Networks, Server, Router and Gateways and also Blockchains, Smart Contracts, Wallets, dApps, DLT etc. In IoT/Industrie 4.0, SCADA and in general.

Events

19.06.2018
Blockchain Summit
Vortrag über Sicherheit von Smart Contracts
06.07.2018
12. Johner Institutstag
Prof. Dr. H. Pohl: Security Testing Process für Medizinprodukte auf dem 12. Johner Institutstag in Konstanz
12.07.2018
Security Testing Day
In Kooperation mit Imbus Rheinland GmbH: Betrachten Sie Ihre IT-Systeme aus der Sicht eines Angreifers: Erfahrene Penetration-Tester vermitteln Ihnen einen umfassenden und praxisnahen Einblick in die Angriffsmöglichkeiten professioneller Krimineller (Hacker), stellen die Arten von Sicherheitslücken und die Anwendung von Angriffstools dar und liefern Ihnen auch die angemessenen Sicherheitsmaßnahmen.
All Events
shadow

Customers and Partners

shadow