www.cyber-crypt.com Open in urlscan Pro
2a05:d014:58f:6200::65  Public Scan

Submitted URL: https://cybercrypt.ch/
Effective URL: https://www.cyber-crypt.com/
Submission: On December 17 via api from CH — Scanned from CH

Form analysis 1 forms found in the DOM

POST

<form data-validation="true" id="whitepaper" method="post" novalidate=""><input type="hidden" name="form-name" value="whitepaper"><input style="display:none" name="fax">
  <div class="form-group"><label for="name">Name</label><input class="form-control" type="text" name="name" id="name" placeholder="MY NAME" required="" data-parsley-minlength="3" data-parsley-required-message="Please enter your name"
      data-parsley-pattern="^[A-Za-z ]+$" value=""></div>
  <div class="form-group"><label for="email">E-mail</label><input class="form-control" type="email" name="email" id="email" placeholder="MY E-MAIL" required="" data-parsley-required-message="Please enter your e-mail" data-parsley-type="email"
      data-parsley-type-message="Please enter your valid email" value=""></div>
  <div class="form-group"><label for="company">COMPANY</label><input class="form-control" type="text" name="company" id="company" placeholder="MY COMPANY" required="" data-parsley-minlength="3"
      data-parsley-required-message="Please enter your company" value=""></div>
  <div class="form-group"><label for="job">Title</label><input class="form-control" type="text" name="job" id="job" placeholder="MY TITLE" required="" data-parsley-minlength="3" data-parsley-required-message="Please enter your title"
      data-parsley-pattern="^[A-Za-z\. ]+$" value=""></div>
  <div class="form-group"><label for="phone">Mobile</label><input class="form-control" type="text" name="phone" id="phone" placeholder="MY MOBILE NUMBER" required="" data-parsley-required-message="Please enter your mobile number"
      data-parsley-pattern="^[+]?[0-9]{3,12}$" data-parsley-pattern-message="Please enter your valid phone number 1" value=""></div>
  <div class="checkbox-group"><input type="checkbox" name="agreed" id="agreed" data-agreed-checkbox="true" required="" data-parsley-required-message="" data-parsley-mincheck="1" data-parsley-multiple="agreed"><label for="agreed"><span class="text">
        <p>Yes, I accept that my personal data will be collected and stored according to CYBERCRYPT’s privacy policy. In addition, I agree to receive occasional news updates and other information from CYBERCRYPT.</p>
      </span></label></div>
  <div class="col-cta">
    <a class="btn btn-cta btn-text-blue" title="Download" data-btn-submit="true" href="/media/45niosks/cybercrypt-wp2021.pdf" target="_blank" data-lf-fd-inspected-belvo73mjlbazmqj="true">Read it now<span class="arrow arrow-down circle-blue icon-arrow-long"></span></a>
  </div>
</form>

Text Content

Our sites use tracking technologies. You can read more and control it in our
Privacy Policy.

What We Do
Our Approach
Products

CYBERCRYPT D1

Data protection in cloud




CYBERCRYPT A1

IN-APP PROTECTION


About Us
OUR BLOG
Contact
Our Approach

CYBERCRYPT D1

Data protection in cloud

CYBERCRYPT A1

In-app protection

About Us
Blog
Contact

WHAT WE DO

WE HELP
COMPANIES DEVELOP
SECURE PRODUCTS

CYBERCRYPT's decades of experience in cryptography, security architecture, and
security analysis keep your products protected.

Get in Touch

Our Testimonials

“We at BEUMER Group have used CYBERCRYPT to help assess the security in a
selected SCADA web application both on the server and client sides. CYBERCRYPT
has demonstrated its high expertise in security analysis and cryptography by
quickly identifying areas where the security might be further improved. There
has been a professional and pleasant dialogue regarding different evaluations of
risks and possible changes to concrete implementations and strategic decisions.
The engagement with CYBERCRYPT has helped us to raise the security awareness
within our product development department. All in all, our impression of
CYBERCRYPT’s work is highly positive.”

Claus Riber
Senior Manager, SW Cyber Security
BEUMER Group

“The IOTA Foundation is honored and excited to be collaborating with CYBERCRYPT
to ensure we achieve world-leading security for the IOTA protocol.”

David Sønstebø
Co-Founder and Co-chair
IOTA Foundation

“We engaged CYBERCRYPT to improve the security posture of the Aztrix platform
for contact data and privacy management. CYBERCRYPT’s expert advice was prompt
and informative. We appreciate CYBERCRYPT’s approach to security, which follows
defence-in-depth and zero-trust principles, especially when processing sensitive
data like PII, which became an integral part of our product development
strategy.”

Karel Ribbens
Founder & Managing Partner
Aztrix* NV

“We are thrilled to recommend CYBERCRYPT for any company in need of elevating
their security posture. Whatever the complexity level of your project,
CYBERCRYPT will be able to help out in an efficient way and change the way you
think about security.”

Chad McCollum
CEO
OPe Technologies

“CYBERCRYPT guided us to develop world’s first cybersecurity package for the
NTU-VOLVO autonomous bus based on their unique security technology CYBERCRYPT
D1. Their expertise and experience in automotive security formed the basis in
developing cyber safe maneuvering of the bus in a simulated attack prone
environment. CYBERCRYPT’s contribution has been instrumental in us achieving
critical to operation milestones. We are excited to collaborate with CYBERCRYPT
to extend the technology to diverse fleet of vehicles deployed for public
transport.”

Dr. Anshuman Tripathi
Programme Director Future Mobility Solutions
Nanyang Technical University (NTU)
Our Blog

INSIGHTS INTO

CYBERSECURITY

All posts
September 27, 2022
Meet CYBERCRYPT D1: Holistic data protection in the application layer
CYBERCRYPT D1 is our solution to address the modern threat landscape around data
security and is there to prevent data breaches and ransomware attacks in your
cloud workflows and applications. It can be had as a package together with our
expert services: We will help protect your data holistically. Read More

July 05, 2022
Case Study: NTU-LTA-Volvo Autonomous Bus in Singapore
NTU Singapore and Volvo Buses have launched the world’s first full size,
autonomous electric bus. CYBERCRYPT contributed a cybersecurity package to the
project incl. its solution CYBERCRYPT D1 for data and configuration
protection. Read More

March 28, 2022
Post-Quantum Cryptography is Here
The quantum threat will affect key management, PKI, TLS, database protection,
blob storage, backup security, authorization, and others. Read More

DATA BREACHES AND RANSOMWARE ON THE RISEBREACHES ON THE RISE

CYBERCRYPT D1

WE PROTECT YOUR

DATA HOLISTICALLY

Protection of data in applications is a necessary layer of defense against
today’s attackers. We protect your databases, messages, object stores, and more
across data centers, cloud environments, devices, and apps.

Read More
What we do

PROTECT YOUR
ASSETS - SECURE
YOUR PRODUCTS

Security is our heart. We provide expert services and solutions, so that you can
deliver your products to market. All the while, we safeguard not only your
critical data, but also that of your customers.


Our Approach

WE PLAN FOR YOUR
LONG-TERM SUCCESS

By implementing the proper cryptography and cyber resilience paradigm, we ensure
that your products achieve the highest protection standards throughout their
lifecycle.

Read More


SECURITY
EVALUATION

A thorough security analysis of your application or architecture ensures that
all security enhancements in your product design process are applied in the most
effective and efficient way.


SECURE
PRODUCT DESIGN

With your specific needs in mind, we create the most effective security
architecture for your product, elevating it to the next security level.


IMPLEMENTATION
AND DEVELOPMENT

We implement your product's new security architecture. Via a detailed project
plan, we support your responsible teams, throughout the process, in their
production environment.


LIFECYCLE
SUPPORT

Your product should meet its security goals throughout its lifecycle. By
training your key personnel, we help you to remain at the forefront of security
technology.

About us

EXPERTS IN CRYPTOGRAPHY AND SECURE PRODUCT DESIGN

We constantly strive to leverage our combined knowledge and expertise in order
to ensure maximal protection for your products.

At CYBERCRYPT, we establish the foundations of product security using
innovative, advanced cryptographic solutions.

Read More

Our cases

SECURE PRODUCT DESIGN FOR EVERY INDUSTRY

We have built cryptography and security into some of the world’s most innovative
products and projects.
Previous

SECURE COMMUNICATIONS APPLICATIONS

Co-development of a protected mobile app for secure communications


SECURE COMMUNICATIONS APPLICATIONS

SECURITY ARCHITECTURE FOR DATA PROTECTION HARDWARE

Design and implementation of novel data protection device through partnership
with a hardware manufacturer in the U.S.


SECURITY ARCHITECTURE FOR NOVEL DATA PROTECTION HARDWARE

SECURE AUTONOMOUS VEHICLES

Development of configuration protection for Electronic Control Units in an
autonomous bus project in Singapore


SECURE AUTONOMOUS VEHICLES

TRAINING IN SECURITY EVALUATION

Comprehensive transfer-of-knowledge courses in security evaluation methodology,
following Common Criteria ISO/IEC 15408 for IT security products




SECURITY ENGINEERING FOR HEALTHTECH

Design of a secure software update for the critical components of a major
European manufacturer of medical devices




CRYPTOGRAPHY FOR SMART HOMES

Design and implementation of lightweight cryptographic protocols for a global
manufacturer of IoT devices




SECURE OPERATING SYSTEMS FOR MOBILE PLATFORMS

Extensive security evaluation of several mobile Linux-based operating systems
incl. architecture, infrastructure, security features, etc.




BINARY ANALYSIS OF APP SHIELDING 

Detailed security assessment of protective mechanisms carried out for a
developer of in-app protection tools with the purpose of product improvement




Next
GET OUR WHITE PAPER


IS YOUR PRODUCT
DESIGNED TO WITHSTAND
THE THREATS OF THE FUTURE?

Name
E-mail
COMPANY
Title
Mobile

Yes, I accept that my personal data will be collected and stored according to
CYBERCRYPT’s privacy policy. In addition, I agree to receive occasional news
updates and other information from CYBERCRYPT.

Read it now
Thank you for opening our white paper, get in touch if you want to learn more.

Our Vision

STRONG PROTECTION FOR EVERY PRODUCT, ROBUST CRYPTOGRAPHY IN EVERY DEVICE

Your assets, along with those of your customers, may be endangered by attacks
that exploit vulnerabilities in your product's architecture, cryptography, and
implementation. These new digital challenges demand designer security
implemented using state-of-the-art security technologies and cryptographic
primitives.

Read More


Get in touch


OUR OFFICES

info@cyber-crypt.com


COPENHAGEN

Denmark

Sankt Annæ Plads 13
1250 Copenhagen
Denmark


MUNICH

Germany

Maximiliansplatz 22
80333 Munich
Germany


ZURICH

Switzerland

Hegibachstrasse 47
8030 Zurich
Switzerland


NEW YORK

USA

228 Park Ave S # 300
New York, NY 10003
USA

We are

THE CRYPTOGRAPHY
AND SECURITY EXPERTS

At CYBERCRYPT, we combine decades of experience in cryptography, secure
architecture, and security analysis to keep your product protected.

Get in Touch

info@cyber-crypt.com

What we do
Our approach
About Us
Contact

Copyright © 2022, Cybercrypt.

Privacy policy