Company profile secunet Security Networks AG



Similar documents
Intelligent Solutions for the Highest IT Security Requirements

Intelligent Solutions for the Highest IT Security Demands

successstory Security for Diplomacy High Security for Embassy Networks

Veridos Protects Identities. The expert for worldwide government solutions

Overview of the key figures for the first half of the year

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

Overview of the key figures for the first nine months

Cyber Security Strategy for Germany

Protecting your information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber Security Review

CYBER SECURITY TRAINING SAFE AND SECURE

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

Secure by design: taking a strategic approach to cybersecurity

Training courses 2015/2016

Business Continuity Policy

developing your potential Cyber Security Training

Brainloop Cloud Security

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

WE ENGINEER THE FUTURE INVESTOR PRESENTATION AUGUST, 2015

MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE

HMG Security Policy Framework

HDI expands Cyber insurance and offers new coverage

RUAG Cyber Security. More security for your data

Management Report Corporate Profile Annual Report 2014 Continental AG 42

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

National Cyber Security Policy -2013

Connecting things. Creating possibilities. A point of view

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

CyberSecurity Solutions. Delivering

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

REPUBLIC OF LATVIA MINISTRY OF DEFENCE NATIONAL ARMED FORCES CYBER DEFENCE UNIT (CDU) CONCEPT

The Crisis Management System in Germany

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

How To Manage Risk On A Scada System

National Plan for Information Infrastructure Protection

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents

The UK cyber security strategy: Landscape review. Cross-government

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

Cybersecurity Strategy of the Republic of Cyprus

Cyber Security - What Would a Breach Really Mean for your Business?

Smart Cities. Smart partners in tomorrow s cities

Developing National Frameworks & Engaging the Private Sector

Company Profile. Aareon AG

Smart Grid Different Flavors for Different Tastes

Cybersecurity Strategic Consulting

The Danish Cyber and Information Security Strategy

On the European experience in critical infrastructure protection

Cloud Computing Security Considerations

Solution & Service Portfolio for the Telco Market.

We Believe in Security with a Capital S

Developing a robust cyber security governance framework 16 April 2015

DEDICATED TO SOLUTIONS. Automotive System and Software Development

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015

ICASAS505A Review and update disaster recovery and contingency plans

Cyber Security Recommendations October 29, 2002

Nokia Networks. security you can rely on

CYBER SECURITY Audit, Test & Compliance

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

Billing Code: Guidance Concerning the National Security Review Conducted by the Committee

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

SerViceS & SolutionS for next generation customer management

Securing the Microsoft Cloud

This is a free 15 page sample. Access the full version online.

Cyber Security solutions

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Best Solutions for Biometrics and eid

Standards for Security Categorization of Federal Information and Information Systems

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

TeleTrusT Bundesverband IT-Sicherheit e.v.

Act of 20 March 1998 No. 10 relating to Protective Security Services (the Security Act)

Application management services that power business transformation

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh

KION Group acquires Handling Automation division of automation specialist Egemin Group

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

IBM Penetration Testing Services

FTTx Roll-out: A Commercial Perspective beyond Technology

Information Security Services

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Assessing the strength of your security operating model

Brenntag Oil & Gas. Efficiency OIL & GAS

WHITE PAPER Security in M2M Communication What is secure enough?

Transcription:

Company profile secunet Security Networks AG Profile in brief secunet is one of the leading German providers of high-quality IT security. Over 380 experts work in the areas of cryptography, e-government, business security and automotive security, and develop innovative products in these fields in addition to highly secure and reliable solutions. Many DAX companies as well as numerous authorities and organisations are among secunet's national and international customers. secunet is IT security partner of the Federal Republic of Germany and Partner of the German Cyber Security Alliance. secunet was founded in 1996 and achieved sales of EUR 91.1 million in 2015. secunet Security Networks AG is listed on the Prime Standard of the German Stock Exchange. In addition to the headquarters in Essen, the company has six further locations in Germany. For more information, please visit www.secunet.com. Facts and figures at a glance Foundation: 1996, as a spin-off of RWTÜV Essen Type of enterprise: Corporation, listed on the Prime Standard of the German Stock Exchange. Main shareholder: Giesecke & Devrient GmbH, Munich (approximately 79% of shares) Headquarters: secunet Security Networks AG Kurfürstenstraße 58 45138 Essen Germany Further locations: Berlin, Dresden, Eschborn, Hamburg, Munich and Siegen (Germany) Service portfolio: Holistic IT security including consulting, concept design, development, implementation, support and powerful products Business units: Business Sector including the divisions Automotive and Critical Infrastructures Public Sector including the divisions Homeland Security, Public Authorities and Defence 1

Customers: Over 500 national and international customers, including the German Foreign Office, Federal Ministry of Defence, Federal Ministry of the Interior, Federal Office for Information Security, Regional Tax Authority of Bavaria, Howaldtswerke-Deutsche Werft GmbH, mobile.de, BMW, Audi, National-Bank, Commerzbank, Gelsenwasser, Stadtwerke Bremen, Stadtwerke München Industry solutions: Public sector, defence, security organizations, critical infrastructures, energy- and water suppliers, telecommunication, automotive industry, transport and logistics Memberships: BITKOM, TeleTrusT Deutschland e.v. Board of Management: Dr Rainer Baumgart (Chairman, responsible for the business units Public Sector and Business Sector, corporate development/strategy, compliance/revision and corporate communications/marketing) Thomas Pleines (responsible for finance & controlling, legal department, human resources, product management coordination) IT Security the highest requirements IT security has long been one of the top-priority issues and one of the greatest challenges for any organization in today's information society. The sector is characterized by fast technological development as well as a very complex range of diverse issues. Additionally, national and international legislation, regulations and directives often dictate very special requirements concerning the security of data and infrastructures. At the same time, organizations are becoming more vulnerable as a result of their growing dependency on well-functioning and networked information processing as well as an increased need among employees for mobile and flexible access to corporate data. More frequent use of different devices and applications also increases risks due to incorrect usage and negligence. The urgent need for a comprehensive, continuously updated security solution for companies and authorities also results from increasingly more sophisticated forms of industrial espionage and cyber war attacks. Today, attacks are not only carried out by individuals, but by well-organized and well-funded groups. But it is not only internal networks that are becoming more vulnerable as a result of increased introduction of electronic components and their connection with the Internet; national infrastructures are also at risk. Attacks on energy supply and communicational networks can be launched from anywhere in the world. Even vehicles will soon be communicating with each other via the Internet. These areas also need stringent security measures to maintain a functioning infrastructure. 2

However, the market provides no assistance in terms of orientation due to high provider fragmentation. Consequently, a comprehensive, substantiated overview of security requirements and solutions is all the more important. For companies and authorities, the relevant financial and personnel investment is usually too high, so they rely on specialist service providers. secunet: premium IT security "made in Germany" Effective, comprehensive IT security can only be achieved through careful planning and professional support. Alongside intelligent technology, factors relating to infrastructure, legislation, organization and personnel must be taken into account during concept design and rollout. secunet relies on holistic IT security that takes into account all these aspects and implements them in applications with long-term protection. Customers benefit from comprehensive consultation as well as from a technologically advanced service and product portfolio that fulfils even the highest security requirements. secunet offers in-depth know-how in various security fields. These range from the highest security levels in authorities and complete solutions for companies, to the protection of Internet access in vehicles. In addition to products developed and marketed in-house for different security levels, secunet also implements solutions from other security providers in order to achieve the best-possible protection tailored to suit the individual needs of the customer. Alongside design concept and installation, the service provider also assumes responsibility for daily operation. The fields covered by secunet include securing authorities' communication by means of encryption, protecting applications in e-government, developing important security technology such as electronic passports and securing critical infrastructures. secunet also uses the experience gathered in these highly sensitive areas to safeguard business-critical processes in companies. These include, for example, research and development projects. In close collaboration with the German Federal Office for Information Security (BSI), secunet continues to design, develop and evaluate new components and products and roll out data security projects. Additionally, secunet has long-term partnerships with the German Federal Ministry of the Interior (BMI) and well-known automotive manufacturers and suppliers. 3

Important information about the company 1996 Foundation of secunet from RWTÜV Focus: digital signatures and cryptography with Internet technologies 1999 Initial public offering Pioneer for PKI/trustcenter development for digital certificates in Germany 2000 Launch of SINA (Secure Inter-Network Architecture) product development for encrypted transmission of confidential documents on behalf of the BSI Expansion from consulting business to product manufacturer Initial tests for the introduction of biometry in sovereign documents 2004 Giesecke & Devrient becomes main shareholder Acquisition of SECARTIS AG, a subsidiary of Giesecke & Devrient from the IT security sector Appointment as IT security partner of the Federal Republic of Germany 2015 Sales: 91.1 million euros EBIT: 8.6 million euros Employees: 383 (As of 31 December 2015) SINA components in use: > 60,000 Formation of the company With the advent of the World Wide Web in the 1990s, the Rheinisch-Westfälische Technische Überwachungsverein (RWTÜV) in Essen expanded its area of activity to cover the evaluation of network security. Digital signatures and encryption technologies in particular played a major role in this. As more and more companies wanted their networks to be tested and improved, the TÜV carved out its department for IT security under the name secunet. The service provider did not only test network security, but also improved it together with the customer through consulting and training as well as designing, implementing and operating an optimized security solution. This is still the focus of its activities to this day. With the further development of security technologies, at the end of the 1990s, secunet contributed to comprehensive public key infrastructures for issuing, distributing and checking digital certificates via state-approved trustcenters. 4

Automotive With the advent of automated driving, we are on the brink of the next big thing in vehicle innovation. But cars are already highly connected with their environment today. They generate and process vast tracts of internal and external data to provide comfort, infotainment and driver security, which means hacking attacks not only threaten vehicle safety, but also the privacy of vehicle owners which is why data protection and security are now indispensable. Where data protection and security are concerned, the automotive industry wants solutions suitable for series production that respond to vehicle-specific needs, as well as to the peculiarities of the entire automotive supply chain. With years of experience in the automotive industry, secunet s Automotive division works with vehicle manufacturers and suppliers to develop and implement production-ready IT security for on-board network components guaranteeing secure internal and external vehicle networking and protecting new mobility services. The division s services range from drafting specification sheets to implementing and launching solutions in the vehicle, system and process landscape, and it uses software and hardware-based technologies depending on the level of protection required. Its portfolio is rounded out by technical security analyses for existing control unit implementations in its own laboratory. Homeland Security In a networked and globalised world, safeguarding domestic security is one of the greatest challenges of our time. National and international security authorities make a vital contribution to protecting society and the state from criminal activity, terrorism and other, similar threats. No matter the threats faced, the organisations responsible for keeping us safe use IT-supported systems and are increasingly reliant on digital processes to do their job. Guaranteeing IT security is therefore crucial to domestic security. The Homeland Security division specialises in meeting the needs of organisations, authorities and departments, and delivers intelligent, tailored, end-to-end IT security solutions for national and international use. It also offers high-powered products, customer-specific developments and highly specialised consulting. The division s main focus is solutions and infrastructure for collecting biometric data, as well as stationary, mobile and automated border control systems, modern (mobile) government workstations, advanced document management systems for processing classified information, and secure, highperformance police networks. 5

Critical Infrastructures Critical infrastructures are organisations and institutions that are crucial to our nation and government. These infrastructures are increasingly reliant on IT-supported systems and require special protection, because malfunction and disruption can have dramatic consequences for the German economy and society. It is therefore vitally important to protect CRITIS from cyber attacks, espionage and sabotage. secunet s Critical Infrastructures division is dedicated to the integrators, manufacturers and operators of critical infrastructures. With industry-specific knowledge and methodical, technical expertise, the division implements efficient and effective IT security strategies and tailored information security solutions. The division specialises in securing the most vulnerable aspects of critical infrastructures while meeting all applicable legal requirements. Its services include IT security consulting, the design of information security management systems, customer-specific software development, penetration tests, certification services and security awareness training. What s more, the division s extensive product portfolio allows customers to prevent malfunctions and security breaches and respond appropriately should the worst happen. Adopting a holistic approach to IT security, the division establishes secure, tamper-proof connections between networks, enables secure (mobile) remote access to sensitive IT areas like process control and automation systems, and implements protection systems. This means cyber attacks are effectively repelled without impairing the availability of critical systems. Public Authorities The processes and IT infrastructures of public authorities present particular challenges in information security, with diverse fields of application from safeguarding digital communications to protecting e-government applications (e.g. against cyber attacks and espionage) and identity management requiring topquality, tailored IT security solutions. secunet s Public Authorities division offers advice and support to national and regional authorities, drawing on state-of-the-art, combinable products and services, and tailored security concepts. These are designed to meet all the needs of modern administration, meaning customers can perform their official duties while taking into account the security requirements for protecting classified information. The division s strengths lie in its years of experience meeting the security needs of public authorities, as well as its specially tailored products and services. This includes supplying secure, mobile workstations and protecting national and regional authority networks, as well as implementing reliable identity management solutions. Information security management systems built according to IT Baseline Protection offer a consistently high level of security, for instance especially considering the unique infrastructural, regulatory, organisational and staff challenges posed by public authorities. SINA products are used for the secure processing, storage, transmission 6

and verification of classified and other sensitive information. Finally, the division s consulting services are rounded out by IT security campaigns and security awareness training. Defence The armed forces, military organisations and authorities have a particularly strong need to protect the confidentiality of their data which ranges from national and international data to mission-related classified information. Closely linked to this are innovative IT security architectures, e.g. for basic IT-based troop operations, C4ISR systems and multinational mission networks. secunet s Defence division draws on years of experience and an in-depth understanding of national and international defence to support military customers. It also assists system integrators, technology companies, consulting firms and research institutes in this unique market segment. Together with the German Federal Office for Information Security, secunet s specialists develop SINA (E/H) cryptographic devices for national and international customers with high security requirements. SINA makes it possible to securely process, store, transfer and register classified information up to and including security classifications STRENG GEHEIM (TOP SECRET), NATO SECRET and SECRET UE. The diversity of secunet s unique product range including stationary and mobile clients, IPsec and unidirectional gateways, Ethernet encryptors and a registry-compliant solution (SINA Workflow) makes it possible to create security domains for all manner of application scenarios. In addition, the division offers complementary security solutions in the following technology areas: public key infrastructures, biometric security solutions, ReCoBS (Remote Controlled Browser Systems) and cyber defence. The Defence division s services are rounded out by SINA and IT security consulting (especially in the context of security and network architectures), SINA system integration and application-oriented research. 7

Press contact: Christine Skropke, Spokesperson Phone: +49 201 5454-1231 Fax: +49 201 54 54-1235 Patrick Franitza, Dep. Spokesperson Phone: +49 201 54 54-1223 Fax: +49 201 54 54-1235 email: presse@secunet.com www.secunet.com secunet Security Networks AG Kurfürstenstraße 58 45138 Essen (Germany) 8