shadow

About softScheck

Hartmut PohlProf. Dr. Hartmut Pohl
CEO

supports you in methodically developing secure software and firmware – based on recognized industry guidelines such as ‘ISO 27034 Application Security’ and the OWASP Software Assurance Maturity Model or Secure Software Development Life Cycle (S-SDLC, Microsoft).

Our core competencies range from Security Requirements Analysis, Threat Modeling, Static Source Code Analysis, classic Penetration Testing and Fuzzing and Security Testing to Compliance Testing.

In addition, we perform certified Security Test services as an audit partner of TÜV Saarland and DEKRA.

shadow

News

Smarter World Produkt des Jahres 2019 Smarter World price for the product of the year goes to .

Latest Publication

The 10 most common security vulnerabilities in medical devices

Security Testing Medical Devices (Software and Hardware)

Download PDF

Latest Blog post

Log4Shell — critical vulnerability in Java logging library Log4j

On November 24th a critical vulnerability (zero-day vulnerability) in Log4j was reported to Apache. It was later (10th December) made pub...

Read Article
shadow

What our clients are saying

"As long as I require penetration testing, I will be a client of softScheck."

„It was a really very good and pleasant cooperation with your colleagues. I had a lot of fun!“

Axel Koch, Storz Medical AG
Software Development

“softScheck’s customer-orientation is characterized by a high sense of responsibility towards the customer. The consultants were personally available to answer questions even after the security tests were completed.”

Jens Heddrich, Sofort GmbH
IT-Security Officer

“The customer-oriented consultants of softScheck GmbH successfully supported us during the threat modeling of a Java EE application.”

Stefan Krecher, Hannover Re
Software Engineer, IT-Business Solutions
shadow

Security Testing as a Service

Everybody is talking about attacks on IT systems and trying to recognize them. A completely wrong strategy!
Actually vulnerabilities are the root of all evil. Attacks are only successful if they can exploit a vulnerability. Therefore:

Let us improve your security: identifies Zero-Day-Vulnerabilities in every type of software and hardware. We offer „Security Testing as a Service“ in form of a holistic process.

secures your software, firmware, apps and systems, Networks, Server, Router and Gateways and also Blockchains, Smart Contracts, Wallets, dApps, DLT etc. In IoT/Industrie 4.0, SCADA and in general.

shadow

Events

22.09.2022
Forum Safety & Security 2022
Prof. Dr. Hartmut Pohl & Wilfried Kirsch halten die Abschluss-Keynote zum Thema "Post-Quanten-Kryptografie: Daten für die Zukunft schützen"
All Events
shadow

Customers and Partners

Storz Medical AG
netcologne logo
fsp logo
it-sa
ISA
Allianz für Cyber-Sicherheit
openlimit logo
GI
infoteam
bitkom logo
Johner-Institut
Berlin University of Digital Sciences
nrw units
privacy one
kvw