softScheck

softScheck

softScheck is an IT security consultancy.

Our core competencies range from classic pentesting over compliance testing up to security auditing of software and it infrastructure aswell as attendance of systematic software developing acording to the ISO 27034 standard.

The core of our Service is a tool driven integral security testing process of soft- and hardware, which covers the whole development cycle (design, implementation and deployment). Using Threat Modeling we look at the program architecture from the attackers view. Using Dynamic Analysis, we identify semi-automated and cost-saving hitherto unrecognized defects and security vulnerabilities in binary code.

softScheck is a member of the Alliance for Cyber Security and provides training and workshops on topics such as Secure Development, Threat Modeling, Web Application Security and Mobile Security.

Contact Information

Categories:
Consulting Services

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

CIA cyber security intelligence activities come under the Directorate of Science & Technology and the Directorate of Digital Innovation.

Pluralsight

Pluralsight

Pluralsight provides online video training courses for software developers, IT administrators, and creative professionals.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

ServerCentral Turing Group (SCTG)

ServerCentral Turing Group (SCTG)

ServerCentral Turing Group (SCTG) offers colocation, cloud, and disaster recovery services to businesses across industries.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

ElevenPaths

ElevenPaths

ElevenPaths offer a portfolio of comprehensive cybersecurity solutions including IoT security, Identity & Access, Mobile Security, Antifraud, Industrial Cybersecurity, Risk & Security management

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Kognos

Kognos

Kognos provides the world's first automated investigation and threat story building platform.