Security Audits, Verification & Validation


We will inspect your existing systems with regard to security vulnerabilities, which also includes checking the solidity of your security design and its implementation. We evaluate the adequacy and correctness of your security algorithms and test whether the protection of your user interfaces can be breached.

We also support you in analyzing your IT infrastructure with regard to fundamental security requirements and generally recognized best practices, for instance in accordance with the IT baseline protection catalogs. We help you to identify your greatest IT risk potentials and to secure your local IP networks.

“With comlet we managed to increase our technological edge over the competition.”

Dr. Stefan R. Schönthaler,

embedded world 2015

Tuesday, 04. November 2014

  From the 24th to 26th of February 2014 the largest international...

Show news »