Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 7 / Booth Number 7-309

Security Engineering


Public key infrastructure Risk analysis and management Industrial IT security

Key Facts

  • Support for threat analysis and risk assessment
  • Planning and hosting of security workshops
  • Accompaniment throughout the entire development process

Product Description

Digital, networked manufacturing and cybersecurity come together at a new security level. The market is demanding secure products and solutions that can reliably fend off hacker attacks and come with verified security, for example in the form of safety certification to IEC 62443. The new provisions for networked products and solutions will in future make a key contribution to achieving greater cybersecurity in both networked manufacturing operations and critical infrastructures.

To this end, achelos offers an extensive portfolio of comprehensive security engineering services and individual key management solutions for industrial cybersecurity.

With its many years of experience in the development and evaluation of secure software, achelos boasts profound cryptographic expertise and specialist knowledge of embedded systems for every project phase.

Secure software starts with a risk assessment. Our security engineers support you when performing the threat analysis and risk assessment to ensure that security requirements can be specified efficiently for your product. Our security engineers plan and host security workshops as a way of identifying potential threats to the security of ICS-components and assessing their severity. The results of the workshops can then be used to derive security objectives and security requirements for ongoing project work.

Our security engineers accompany you throughout the entire development process. They examine security requirements, work with you to develop security architectures and are the central contacts for any product security-related issues and questions your team of developers may have.

As integration partner, we support you in the implementation of cybersecurity and cryptographic functions in embedded Secure Elements (eSEs) to enable ICS components to be toughened ready for product certification.

... read more

Download product information


This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.