TÜViT specifies cybersecurity architecture for On-board Telematics Platform (OTP)

Read more

Data Center Certification: What You Need to Know

Download White Paper

Hardware Security Lab: Smart Chips for more IT Security

Read more

Your IT Security and Quality – independently checked

TÜV tested – this additional endorsement is always considered to be a seal of quality not only in Germany, but globally, and with good reason. What is true for cars, machines, plants or buildings, TÜViT has been making it possible for hardware and software for more than 20 years: certified, secure products and systems that your clients can rely on.

Managing Corona

Customer information: Dealing with the Corona virus

The Corona crisis has a significant impact not only on our private, but also on our professional everyday life. We at TÜViT have therefore also taken measures to provide the best possible protection for our employees and those of our customers, on the one hand, and to continue our consulting, testing and certification services, on the other.


REMOTE instead of ON-SITE: Possibilities of auditing in times of Corona

In view of the current situation, we offer audits via video conference in many cases. In our overview you will find services that are currently offered remotely or in modified form.

Our videos

#explore - the online magazine of TÜV NORD GROUP


So what exactly is 5G?

“Higher, faster, further” is a motto that applies not just to sport but also to mobile telephony standards. At least as far as speed is concerned: Waiting in the wings is a new standard in the form of 5G that is predicted to be 20 times faster than the fastest mobile telephony network currently operating. As well as offering more efficient streaming for users, 5G is also poised to usher in the age of autonomous and networked driving. Not to mention its role in advancing the causes of the Smart City, Industry 4.0 and telemedicine.
Read more
General Data Protection Regulation

What changes is the new European General Data Protection Regulation going to bring about?

Since 25 May 2018, the GDPR has entered into force. As of this date, stiff penalties may be imposed for breaches of the data protection provisions. Even so, some companies haven't yet got to grips with the new directive, and for many users it’s still unclear how and in which cases the GDPR will reinforce their rights. #explore explains what companies, website operators and users have to look forward to.
Read more
Surveillance cameras

What are the implications of smart video surveillance for data protection?

Video cameras designed to use facial recognition to identify criminals, terrorists or other individuals of concern are already in use on a trial basis at Berlin Südkreuz railway station. This project of the German Ministry of the Interior has sparked fierce controversy around the questions of the legal basis for the use of smart video surveillance and its implications for data protection.
Read more
Privacy by Design

What is Privacy by Design?

It always used to be the case that data protection was at the bottom of the pile when it came to software development. Privacy by Design is now set to change this. Thanks to the General Data Protection Regulation, this principle is even going to be mandatory for companies as of 25 May 2018. Jörg Schlißke explains what's behind the concept and how it will improve data protection for users.
Read more
Fake News

The truth about fake news

Fake news is now so well camouflaged that, to the untrained eye, it’s very difficult to recognise it as fabricated. But what exactly is fake news? How do false reports spread, and how can you identify them? Dirk Kretzschmar answers these questions in #explore.
Read more
Software developers.
Security by Design

What is Security by Design?

Software, hardware and security are subjects that have always been very closely linked. And yet, in the light of increasing networking with the Internet, they will have to dovetail even more closely in the future if protection is to be guaranteed.
Read more
Common Criteria
Common Criteria

What are the Common Criteria?

Against the backdrop of an increasingly networked world and the need for ever greater security in the field of IT, the Common Criteria (CC) are growing in importance.
Read more
Cyber Security

Digital Society Institute: Research to improve IT security

Security policy, cyber security, data protection and privacy: these are issues close to Isabel Skierka’s heart.
Read more
The "good" hacker
Protection against cyber-attacks

What is a "good" hacker?

Cyber attacks are an increasing threat to private individuals, companies and government agencies alike – the consequences can be immense. To avoid these, TÜViT experts uncover vulnerabilities and provide security.
Read more