9 - 11 October 2018 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2017
Zoom product LOGO_Cyber Security Services

Cyber Security Services

LOGO_Cyber Security Services

Cyber Security Services

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitor Database.

An error has occurred.

Our cyber security experts help you to safely develop and operate your embedded and IT systems. We provide the following services:

Security architecture:

  • Analysis of security requirements
  • Design verification
  • End-to-end system evaluation (sensor to backend, Car-to-X)
  • Development of relevant countermeasures
  • Development of hardening guides for real-time operating Systems
  • Integration of security functionalities
  • Planning and implementation of processes such as Information Security Management Systems (according to ISO 27001 / BSI-Grundschutz)
  • Planning and implementation of disaster recovery planning.

Threat and risk analysis:

  • End-to-end security assessments and risk analyses for safety-critical Systems (sensor to backend)
  • Identification of assets
  • Assessment of impacts
  • Determination of threat Scenarios
  • Analysis of potentiality
  • Identification of attack vectors,
  • Definition of appropriate, economical countermeasures


In our Cyber Labs we carry out analyses and tests in a realistic but risk-free environment:

  • Functional security testing: Evaluation of all security-related functions of the System, test for compliance to specifications and standards, check algorithm behaviour and robustness of implementation (e.g. stress test)
  • Vulnerability scanning / fuzzing: Testing for known vulnerabilities, applying white box (code analysis), black box (scanning) and fuzzing methods

Penetration testing: At a system and device level on embedded systems, web applications, IT and specialised systems (e.g. SAP, Industrial Control Systems)

Order your it-sa ticket online in our TicketShop. Save your ticket now!


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.