About softScheck

Hartmut PohlProf. Dr. Hartmut Pohl

supports you in methodically developing secure software and firmware – based on recognized industry guidelines such as ‘ISO 27034 Application Security’ and the OWASP Software Assurance Maturity Model or Secure Software Development Life Cycle (S-SDLC, Microsoft).

Our core competencies range from Security Requirements Analysis, Threat Modeling, Static Source Code Analysis, classic Penetration Testing and Fuzzing and Security Testing to Compliance Testing.

In addition, we perform certified Security Test services as an audit partner of TÜV Saarland and DEKRA.



Smarter World Produkt des Jahres 2019 Smarter World price for the product of the year goes to .

Latest Publication

The 10 most common security vulnerabilities in medical devices

Security Testing Medical Devices (Software and Hardware)

Download PDF

Latest Blog post

Log4Shell — critical vulnerability in Java logging library Log4j

On November 24th a critical vulnerability (zero-day vulnerability) in Log4j was reported to Apache. It was later (10th December) made pub...

Read Article

What our clients are saying

"As long as I require penetration testing, I will be a client of softScheck."

„It was a really very good and pleasant cooperation with your colleagues. I had a lot of fun!“

Axel Koch, Storz Medical AG
Software Development

“softScheck’s customer-orientation is characterized by a high sense of responsibility towards the customer. The consultants were personally available to answer questions even after the security tests were completed.”

Jens Heddrich, Sofort GmbH
IT-Security Officer

“The customer-oriented consultants of softScheck GmbH successfully supported us during the threat modeling of a Java EE application.”

Stefan Krecher, Hannover Re
Software Engineer, IT-Business Solutions

Security Testing as a Service

Everybody is talking about attacks on IT systems and trying to recognize them. A completely wrong strategy!
Actually vulnerabilities are the root of all evil. Attacks are only successful if they can exploit a vulnerability. Therefore:

Let us improve your security: identifies Zero-Day-Vulnerabilities in every type of software and hardware. We offer „Security Testing as a Service“ in form of a holistic process.

secures your software, firmware, apps and systems, Networks, Server, Router and Gateways and also Blockchains, Smart Contracts, Wallets, dApps, DLT etc. In IoT/Industrie 4.0, SCADA and in general.



Log4Shell, Ransomware und erfolgreiche Gegenmaßnahmen — Die Gefahr ist nicht vorbei!
Erfolgreich angegriffen wurden bereits Amazon, Apple, Tesla, Twitter, Steam etc. Wegen der einfachen Ausnutzung und der möglichen schweren Folgen hat das BSI am 11. Dezember die höchste Warnstufe „Rot“ vergeben. Die kritische Sicherheitslücke (Zero-Day-Schwachstelle) in Log4j wurde am 10. Dezember unter dem Namen Log4Shell (CVE-2021-44228) veröffentlicht. Sie wird seit längerem remote ausgenutzt und erlaubt Angreifern Angriffscode auszuführen (RCE).
Forum Safety & Security 2022
Prof. Dr. Hartmut Pohl & Wilfried Kirsch halten die Abschluss-Keynote zum Thema "Post-Quanten-Kryptografie: Daten für die Zukunft schützen"
All Events

Customers and Partners

Storz Medical AG
netcologne logo
fsp logo
Allianz für Cyber-Sicherheit
openlimit logo
bitkom logo
Berlin University of Digital Sciences
nrw units
privacy one