www.cyber-crypt.com
Open in
urlscan Pro
2a05:d014:58f:6200::65
Public Scan
Submitted URL: https://cybercrypt.ch/
Effective URL: https://www.cyber-crypt.com/
Submission: On December 17 via api from CH — Scanned from CH
Effective URL: https://www.cyber-crypt.com/
Submission: On December 17 via api from CH — Scanned from CH
Form analysis
1 forms found in the DOMPOST
<form data-validation="true" id="whitepaper" method="post" novalidate=""><input type="hidden" name="form-name" value="whitepaper"><input style="display:none" name="fax">
<div class="form-group"><label for="name">Name</label><input class="form-control" type="text" name="name" id="name" placeholder="MY NAME" required="" data-parsley-minlength="3" data-parsley-required-message="Please enter your name"
data-parsley-pattern="^[A-Za-z ]+$" value=""></div>
<div class="form-group"><label for="email">E-mail</label><input class="form-control" type="email" name="email" id="email" placeholder="MY E-MAIL" required="" data-parsley-required-message="Please enter your e-mail" data-parsley-type="email"
data-parsley-type-message="Please enter your valid email" value=""></div>
<div class="form-group"><label for="company">COMPANY</label><input class="form-control" type="text" name="company" id="company" placeholder="MY COMPANY" required="" data-parsley-minlength="3"
data-parsley-required-message="Please enter your company" value=""></div>
<div class="form-group"><label for="job">Title</label><input class="form-control" type="text" name="job" id="job" placeholder="MY TITLE" required="" data-parsley-minlength="3" data-parsley-required-message="Please enter your title"
data-parsley-pattern="^[A-Za-z\. ]+$" value=""></div>
<div class="form-group"><label for="phone">Mobile</label><input class="form-control" type="text" name="phone" id="phone" placeholder="MY MOBILE NUMBER" required="" data-parsley-required-message="Please enter your mobile number"
data-parsley-pattern="^[+]?[0-9]{3,12}$" data-parsley-pattern-message="Please enter your valid phone number 1" value=""></div>
<div class="checkbox-group"><input type="checkbox" name="agreed" id="agreed" data-agreed-checkbox="true" required="" data-parsley-required-message="" data-parsley-mincheck="1" data-parsley-multiple="agreed"><label for="agreed"><span class="text">
<p>Yes, I accept that my personal data will be collected and stored according to CYBERCRYPT’s privacy policy. In addition, I agree to receive occasional news updates and other information from CYBERCRYPT.</p>
</span></label></div>
<div class="col-cta">
<a class="btn btn-cta btn-text-blue" title="Download" data-btn-submit="true" href="/media/45niosks/cybercrypt-wp2021.pdf" target="_blank" data-lf-fd-inspected-belvo73mjlbazmqj="true">Read it now<span class="arrow arrow-down circle-blue icon-arrow-long"></span></a>
</div>
</form>
Text Content
Our sites use tracking technologies. You can read more and control it in our Privacy Policy. What We Do Our Approach Products CYBERCRYPT D1 Data protection in cloud CYBERCRYPT A1 IN-APP PROTECTION About Us OUR BLOG Contact Our Approach CYBERCRYPT D1 Data protection in cloud CYBERCRYPT A1 In-app protection About Us Blog Contact WHAT WE DO WE HELP COMPANIES DEVELOP SECURE PRODUCTS CYBERCRYPT's decades of experience in cryptography, security architecture, and security analysis keep your products protected. Get in Touch Our Testimonials “We at BEUMER Group have used CYBERCRYPT to help assess the security in a selected SCADA web application both on the server and client sides. CYBERCRYPT has demonstrated its high expertise in security analysis and cryptography by quickly identifying areas where the security might be further improved. There has been a professional and pleasant dialogue regarding different evaluations of risks and possible changes to concrete implementations and strategic decisions. The engagement with CYBERCRYPT has helped us to raise the security awareness within our product development department. All in all, our impression of CYBERCRYPT’s work is highly positive.” Claus Riber Senior Manager, SW Cyber Security BEUMER Group “The IOTA Foundation is honored and excited to be collaborating with CYBERCRYPT to ensure we achieve world-leading security for the IOTA protocol.” David Sønstebø Co-Founder and Co-chair IOTA Foundation “We engaged CYBERCRYPT to improve the security posture of the Aztrix platform for contact data and privacy management. CYBERCRYPT’s expert advice was prompt and informative. We appreciate CYBERCRYPT’s approach to security, which follows defence-in-depth and zero-trust principles, especially when processing sensitive data like PII, which became an integral part of our product development strategy.” Karel Ribbens Founder & Managing Partner Aztrix* NV “We are thrilled to recommend CYBERCRYPT for any company in need of elevating their security posture. Whatever the complexity level of your project, CYBERCRYPT will be able to help out in an efficient way and change the way you think about security.” Chad McCollum CEO OPe Technologies “CYBERCRYPT guided us to develop world’s first cybersecurity package for the NTU-VOLVO autonomous bus based on their unique security technology CYBERCRYPT D1. Their expertise and experience in automotive security formed the basis in developing cyber safe maneuvering of the bus in a simulated attack prone environment. CYBERCRYPT’s contribution has been instrumental in us achieving critical to operation milestones. We are excited to collaborate with CYBERCRYPT to extend the technology to diverse fleet of vehicles deployed for public transport.” Dr. Anshuman Tripathi Programme Director Future Mobility Solutions Nanyang Technical University (NTU) Our Blog INSIGHTS INTO CYBERSECURITY All posts September 27, 2022 Meet CYBERCRYPT D1: Holistic data protection in the application layer CYBERCRYPT D1 is our solution to address the modern threat landscape around data security and is there to prevent data breaches and ransomware attacks in your cloud workflows and applications. It can be had as a package together with our expert services: We will help protect your data holistically. Read More July 05, 2022 Case Study: NTU-LTA-Volvo Autonomous Bus in Singapore NTU Singapore and Volvo Buses have launched the world’s first full size, autonomous electric bus. CYBERCRYPT contributed a cybersecurity package to the project incl. its solution CYBERCRYPT D1 for data and configuration protection. Read More March 28, 2022 Post-Quantum Cryptography is Here The quantum threat will affect key management, PKI, TLS, database protection, blob storage, backup security, authorization, and others. Read More DATA BREACHES AND RANSOMWARE ON THE RISEBREACHES ON THE RISE CYBERCRYPT D1 WE PROTECT YOUR DATA HOLISTICALLY Protection of data in applications is a necessary layer of defense against today’s attackers. We protect your databases, messages, object stores, and more across data centers, cloud environments, devices, and apps. Read More What we do PROTECT YOUR ASSETS - SECURE YOUR PRODUCTS Security is our heart. We provide expert services and solutions, so that you can deliver your products to market. All the while, we safeguard not only your critical data, but also that of your customers. Our Approach WE PLAN FOR YOUR LONG-TERM SUCCESS By implementing the proper cryptography and cyber resilience paradigm, we ensure that your products achieve the highest protection standards throughout their lifecycle. Read More SECURITY EVALUATION A thorough security analysis of your application or architecture ensures that all security enhancements in your product design process are applied in the most effective and efficient way. SECURE PRODUCT DESIGN With your specific needs in mind, we create the most effective security architecture for your product, elevating it to the next security level. IMPLEMENTATION AND DEVELOPMENT We implement your product's new security architecture. Via a detailed project plan, we support your responsible teams, throughout the process, in their production environment. LIFECYCLE SUPPORT Your product should meet its security goals throughout its lifecycle. By training your key personnel, we help you to remain at the forefront of security technology. About us EXPERTS IN CRYPTOGRAPHY AND SECURE PRODUCT DESIGN We constantly strive to leverage our combined knowledge and expertise in order to ensure maximal protection for your products. At CYBERCRYPT, we establish the foundations of product security using innovative, advanced cryptographic solutions. Read More Our cases SECURE PRODUCT DESIGN FOR EVERY INDUSTRY We have built cryptography and security into some of the world’s most innovative products and projects. Previous SECURE COMMUNICATIONS APPLICATIONS Co-development of a protected mobile app for secure communications SECURE COMMUNICATIONS APPLICATIONS SECURITY ARCHITECTURE FOR DATA PROTECTION HARDWARE Design and implementation of novel data protection device through partnership with a hardware manufacturer in the U.S. SECURITY ARCHITECTURE FOR NOVEL DATA PROTECTION HARDWARE SECURE AUTONOMOUS VEHICLES Development of configuration protection for Electronic Control Units in an autonomous bus project in Singapore SECURE AUTONOMOUS VEHICLES TRAINING IN SECURITY EVALUATION Comprehensive transfer-of-knowledge courses in security evaluation methodology, following Common Criteria ISO/IEC 15408 for IT security products SECURITY ENGINEERING FOR HEALTHTECH Design of a secure software update for the critical components of a major European manufacturer of medical devices CRYPTOGRAPHY FOR SMART HOMES Design and implementation of lightweight cryptographic protocols for a global manufacturer of IoT devices SECURE OPERATING SYSTEMS FOR MOBILE PLATFORMS Extensive security evaluation of several mobile Linux-based operating systems incl. architecture, infrastructure, security features, etc. BINARY ANALYSIS OF APP SHIELDING Detailed security assessment of protective mechanisms carried out for a developer of in-app protection tools with the purpose of product improvement Next GET OUR WHITE PAPER IS YOUR PRODUCT DESIGNED TO WITHSTAND THE THREATS OF THE FUTURE? Name E-mail COMPANY Title Mobile Yes, I accept that my personal data will be collected and stored according to CYBERCRYPT’s privacy policy. In addition, I agree to receive occasional news updates and other information from CYBERCRYPT. Read it now Thank you for opening our white paper, get in touch if you want to learn more. Our Vision STRONG PROTECTION FOR EVERY PRODUCT, ROBUST CRYPTOGRAPHY IN EVERY DEVICE Your assets, along with those of your customers, may be endangered by attacks that exploit vulnerabilities in your product's architecture, cryptography, and implementation. These new digital challenges demand designer security implemented using state-of-the-art security technologies and cryptographic primitives. Read More Get in touch OUR OFFICES info@cyber-crypt.com COPENHAGEN Denmark Sankt Annæ Plads 13 1250 Copenhagen Denmark MUNICH Germany Maximiliansplatz 22 80333 Munich Germany ZURICH Switzerland Hegibachstrasse 47 8030 Zurich Switzerland NEW YORK USA 228 Park Ave S # 300 New York, NY 10003 USA We are THE CRYPTOGRAPHY AND SECURITY EXPERTS At CYBERCRYPT, we combine decades of experience in cryptography, secure architecture, and security analysis to keep your product protected. Get in Touch info@cyber-crypt.com What we do Our approach About Us Contact Copyright © 2022, Cybercrypt. Privacy policy