Ask Jenny
secunet
DE
Before you can edit a profile on Jenny, we need to know who you are. Please message us at [email protected]
At secunet, more than 500 experts focus on topics such as cryptography (SINA), e-government, business security and automotive security with the aim of always staying one step ahead of the competition in terms of quality and technology. Our services range from analysis to consulting, conception, development and integration of software and hardware solutions to training and support. In relation to its numerous national and international customers, secunet relies on long-term partnerships.
Airspace Security Platform
Airports benefit from the further automation of the passenger process without having to change the existing infrastructure. Passenger processing becomes even more efficient and a higher passenger throughput can be realised as a result - a decisive advantage in international competition.
Automotive Cybersecurity
The share of electronics in modern, networked vehicles has grown steadily over the past years. Modern vehicles offer many – also wireless – communication interfaces to the internal on-board network. And this trend will only continue in light of current topics, such as electromobility and autonomous driving. But as the number of applications rise, as do the attack surfaces. That is why the corresponding safeguards must be integrated into the vehicle architecture, into the IT and process landscape. Depending on the level of security required, the mechanisms range from software-based approaches to the development of hardware-protected measures.
Biometric Security
secunet is not only one of the leading biometrics experts in Germany. For us, biometrics is definitely not a short-term trend topic, but we have been instrumental in the successful implementation of key biometric projects in Europe for almost 20 years. We deal with biometric registration and verification in the context of sovereign identity documents as well as with personal identification, border control and passenger flow optimization - from research to evaluation, piloting, product development and implementation. In terms of biometrics, we are versatile
Cyber Security Training
Get to know SINA in detail and put the whole potential of this technology to use for your public office or company. We train you and your employees as SINA specialists at our secunet training center in Dresden. Our modular SINA workshops familiarise you completely with our products and provides practical exercises to convey professional usage.
Cybersecurity Consulting
Efficiency boost through digital connectivity - this is only achievable through a holistic security architecture, good security management, and a continuous watch-out for risks related to critical networks on which the value-adding applications and systems operate. We help you meet regulatory requirements and establish security best practices that best match your operational and business objectives and requirements. Our security assessments and individually tailored security concepts enable you to identify and meet the sometimes difficult-to-understand requirements for sustainable protection of IT infrastructures and processes.
Data Security
One of the centrepieces of the secunet portfolio is SINA (Secure Inter-Network Architecture), a high-security solution that secunet developed on behalf of the German Federal Office for Information Security (BSI). SINA is mainly used by clients of secunet's Public Authorities, Homeland Security and Defence divisions, and has taken on an increasingly important role in the Critical Infrastructures division. SINA products are used for the secure processing, storage, transmission and verification of classified and other sensitive information. The system works by strictly separating differently classified data.
Encryption Security
To authenticate users and technical components as well as to sign and encrypt data and messages, digital certificates are used online: they ensure confidentiality and integrity in data transmission during online banking or shopping; But they are also used in intelligent electricity meters or in networked automobiles. Creating, using and managing these digital certificates requires a Public Key Infrastructure (PKI).
Infrastructure Security
A failure or impairment of critical infrastructures (CRITIS) can have a significant impact on the state and the population in modern economies. A threat of supply bottlenecks or risks to public safety and order may arise in extreme cases. Hence the principal security aim of national strategies is to increase protection for such infrastructures, so that ultimately their uninterrupted availability can be assured. Since these are nowadays controlled and monitored to a large extent by information and communication technologies, it is ever more important to protect the IT networks from cyberattacks – and not only the network itself but even the connection between the networks involved.
IoT Security
Secunet edge covers the machine like a protective cover and decouples its life cycle from that of the IT environment. Thus, the product offers IT and OT security without side effects and without affecting machines, systems or production processes.
National Security
In online transactions digital certificates are used to authenticate users or technical components and to sign and encrypt data and information. Digital certificates ensure confidentiality and integrity when transferring data for e. g. online banking or shopping. And they are also used by smart meters or in connected vehicles. To generate, use and manage these digital certificates, a public key infrastructure (PKI) is needed.
Network Security
One of the centrepieces of the secunet portfolio is SINA (Secure Inter-Network Architecture), a high-security solution that secunet developed on behalf of the German Federal Office for Information Security (BSI). SINA is mainly used by clients of secunet's Public Authorities, Homeland Security and Defence divisions, and has taken on an increasingly important role in the Critical Infrastructures division.
Penetration Testing
Almost daily, digital attacks on businesses and government agencies are reported. Apart from the financial damage and the loss of reputation and trust among customers and partners, there are now legal requirements, according to which sensitive data are to be specially protected. In critical infrastructures, the operators themselves are liable for security incidents. In a sustainable IT security strategy, security analysis and penetration testing are key components that can be used to detect the vulnerability of a system and take appropriate protective measures. Because only by a real attack attempt you also have a proof about the extent to which your protective measures really take effect.
Risk Management
With the increasing importance of information technology for business processes and the fulfillment of public tasks, there is an increasing need to protect both professional and IT resources. Information security is thus increasingly understood as an integral part of companies and public bodies. For effective information security, many processes and activities related to potential risks must be monitored and controlled. The establishment of an information security management (ISMS) has proved its worth. Its purpose is to initiate, conduct, monitor, review and above all to improve information security measures. In a later stage, it even makes it possible to measure and detect.
Vulnerability Management
With secunet redbox, secunet offers an integrated and flexible solution for the automated execution of security tests for control units during development. The redbox appliance enables automotive manufacturers and suppliers to gain decisive efficiency gains when performing and extending security tests. Defined test scopes can be easily, quickly and cost-effectively extended to many more ECUs and simultaneously to earlier development stages.
Register to see information
Register to see information
Register to see information
Register to see information
Register to see information