Secure Engineering

Design secure systems and implement and monitor appropriate security controls to protect your organisation's data from cyber-attack, loss or unauthorised access.

condignum Services

Secure software development

Develop secure applications and avoid software vulnerabilities

Developing secure software is a complex undertaking with many stumbling blocks. Not every piece of advice in the textbooks is equally suitable for every development team. Moreover, DevOps and agile approaches have triggered a paradigm shift not only in the development but also in the operation of applications. Therefore security activities must be adapted to faster development cycles and new role distributions.

Use our expertise to establish appropriate security activities in every phase of the development process. We help you to evaluate and set up secure development processes (Secure Software Development Lifecycle (SSDLC)), to establish secure CI/CD pipelines and tools, and to fully secure your "DevOps" processes.

Container Security

From DevOps to DevSecOps - with secure container platforms

Agile development methods and "DevOps" processes aim to put small-scale artefacts into production quickly. Containers and container platforms often serve as the means of choice for the efficient provision of services. However, the flexible platforms offer a lot of security stumbling blocks.

Condignum helps you to clear these out of the way and successfully secure your container platform.

Cloud Security

Security - even more so in the cloud

The use of cloud services opens up many new opportunities and is becoming increasingly important in the IT landscape. However, with the shift of services and data to the cloud, there are also new security risks and legal obligations that need to be considered.

Our condignum security experts support you in all security aspects of your cloud journey. From the development of cloud security strategies, security requirements, necessary processes, as well as the technical advice and verification of used cloud services.

So you can enjoy the benefits of the cloud without having to worry about it.

Network and infrastructure security

Securing the basic infrastructure

The appropriate design of a secure IT network depends on both internal and external factors.

We support you in planning and designing a secure network that both formally meets all existing requirements and offers real protection against attackers. In addition, we accompany you in securing your network components and services so that nothing stands in the way of secure network operation and your business processes can be carried out efficiently and securely.