About softScheck

Hartmut PohlProf. Dr. Hartmut Pohl

supports you in methodically developing secure software and firmware – based on recognized industry guidelines such as ‘ISO 27034 Application Security’ and the OWASP Software Assurance Maturity Model or Secure Software Development Life Cycle (S-SDLC, Microsoft).

Our core competencies range from Security Requirements Analysis, Threat Modeling, Static Source Code Analysis, classic Penetration Testing and Fuzzing and Security Testing to Compliance Testing.

In addition, we perform certified Security Test services as an audit partner of TÜV Saarland and DEKRA.



Smarter World Produkt des Jahres 2019 Smarter World price for the product of the year goes to .

Latest Publication

The 10 most common security vulnerabilities in medical devices

Security Testing Medical Devices (Software and Hardware)

Download PDF

Latest Blog post

How to use an undocumented ILIAS version 4.x, <5.0.21, <5.1.17, <5.2.3 security vulnerability to gain RCE

ILIAS is a free and open source learning platform which can be used to create and distribute web-based teaching and le...

Read Article

What our clients are saying

"As long as I require penetration testing, I will be a client of softScheck."

„It was a really very good and pleasant cooperation with your colleagues. I had a lot of fun!“

Axel Koch, Storz Medical AG
Software Development

“softScheck’s customer-orientation is characterized by a high sense of responsibility towards the customer. The consultants were personally available to answer questions even after the security tests were completed.”

Jens Heddrich, Sofort GmbH
IT-Security Officer

“The customer-oriented consultants of softScheck GmbH successfully supported us during the threat modeling of a Java EE application.”

Stefan Krecher, Hannover Re
Software Engineer, IT-Business Solutions

Security Testing as a Service

Everybody is talking about attacks on IT systems and trying to recognize them. A completely wrong strategy!
Actually vulnerabilities are the root of all evil. Attacks are only successful if they can exploit a vulnerability. Therefore:

Let us improve your security: identifies Zero-Day-Vulnerabilities in every type of software and hardware. We offer „Security Testing as a Service“ in form of a holistic process.

secures your software, firmware, apps and systems, Networks, Server, Router and Gateways and also Blockchains, Smart Contracts, Wallets, dApps, DLT etc. In IoT/Industrie 4.0, SCADA and in general.



Ransomware: Die erfolgreichen Gegenmaßnahmen
2020 wurden mehr als 350 Mio. $ US Lösegeld nach Ransomware-Angriffen gezahlt - über 300 % mehr als im Vorjahr. Wir erläutern die Funktionsweise von Ransomware und die erfolgreichen Gegenmaßnahmen.
Manöver: Ransomware-Angriff
Mit unseren Ransomware-Spezialisten (Senior Security Consultants) arbeiten Sie sich Manöver-artig durch einen Ransomware-Angriff – von den ersten Hinweisen (worauf müssen Sie achten?) bis hin zum erfolgreichen Abschluss des Manövers mit den wirkungsvollen Sicherheitsmaßnahmen zur Vermeidung weiterer Angriffe.
All Events

Customers and Partners

Storz Medical AG
netcologne logo
fsp logo
Allianz für Cyber-Sicherheit
openlimit logo
bitkom logo
Berlin University of Digital Sciences