Skip to content
Go to Country Selector page
Open language menu
Select language
German
English
Topics
Services
Industries
About us
Career
News overview
Contact
Topics
Regulations
AI Safety
Back
Regulations
NIS-2
AI Act
KRITIS Dachgesetz
Radio Equipment Directive
Cyber Security Supply Chain
Cyber Resilience Act
Cyber Security Act
Act on Identity Cards and Electronic Identification
Act on Metering Point Operation and Data Communication
Back
AI Safety
Artificial Intelligence
AI Services
AI Hallucinations
Close Main Navigation
Services
Overview
Business Processes
Data & Data Protection
Applications
Technology & Components
Norms, Standards & Guidelines
Auditing & Evaluation
Consulting
Back
Business Processes
Overview
Information Security Management (ISMS)
Business Continuity Management (BCM)
Physical Security
Back
Data & Data Protection
Overview
Data Protection Management Systems
Data Protection Organisation (DPO)
Data Processing
Data Protection Audit
Back
Applications
Overview
Mobile App Pentest
Web Pentest
Digital Health Applications (DiGA)
Digital Care Applications (DiPA)
Video Consultation
Back
Technology & Components
Overview
Cloud Services
Secure Chips & Microcontrollers
HSMs and Secure Server
Source Code & Firmware Solutions
Post-Quantum Cryptography
Operating and Database Systems
Mobile Radio Systems and Components
Internet of Everything
Back
Norms, Standards & Guidelines
Overview
§8a of the BSI-Act
Fixed-time cybersecurity certification (BSZ)
BSI C5
BSI TR-03109
BSI TR-03148
BSI TR-03153
BSI TR-03161
BSI TR-03181
Common Criteria
CyberSecurity Certified (CSC)
EMVCo
EUDI & eIDAS
FIDO
FIPS 140-3
GSMA NESAS
IEC 62351
IEC 62443
ISO 22301
ISO 27001
ISO 27017
ISO 27018
ISO 27701
IT-Grundschutz
Security Qualification (SQ)
Trusted Site Privacy
Back
Auditing & Evaluation
Overview
Penetration Tests
Code Score Matrix
Back
Consulting
Overview
Project Management
Secure Software Development
Secure Digital Infrastructure
Compromise Assessment
Digital Forensics & Incident Response (DFIR)
Post-Breach-Assessment
Close Main Navigation
About us
Overview
About TÜVIT
Corporate Social Responsibility
References
Our lead experts
Back
About TÜVIT
TÜV NORD IT Secure Communications
TÜV Informationstechnik
Back
Corporate Social Responsibility
Overview
Back
References
Overview
Back
Our lead experts
Overview
Sven Bettendorf
Vasilios Danos
Dietmar Rosenthal
Close Main Navigation
Career
Overview
Vacancies
Pupils
Students
Career starters
Specialist Career
Benefits
Your future colleagues
Back
Vacancies
Overview
Back
Pupils
Overview
Back
Students
Overview
Back
Career starters
Overview
Back
Specialist Career
Overview
Back
Benefits
Overview
Back
Your future colleagues
Overview
Christian Kolf
Michelle Michael
Markus Wagner
Marjan Ziyaei
Yann Lahser
Dennis Schröder
Sven Bettendorf
Close Main Navigation
News overview
Overview
News & Press
Back
News & Press
Overview
Close Main Navigation
Contact
Contact by topic
Locations TÜV Informationstechnik
Location TÜV NORD IT Secure Communications
Back
Contact by topic
Overview
Back
Locations TÜV Informationstechnik
Overview
Back
Location TÜV NORD IT Secure Communications
Overview
Close Main Navigation
Open Navigation
Home
Services
...
Technology & Components
Source Code & Firmware So
...
lutions
Request a customised quot
...
e
Request a customised quote
Request for quote Secure Firmware Updates
* Mandatory fields: We require this information in order to process your comment.
01
Ihre Angaben
02
Ihre Kontaktdaten
Grundlegende Prüfung & Zertifizierung
Design & Code Review sowie Prüfung, Dokumentation, Zertifizierung
*
Basic
Substantial
High
Erweiterte Anforderungen (über die obligatorischen Anforderungen hinaus)
Authentizitäts- und Integritätsprüfung von Firmware-Images
*
L1: Keine Quantenangriffe
L2: Post-Quantensicher
Sicherer Bootvorgang
*
L1: Speicherseparierung
L2: Authentifiziertes Booten
Widerstandsfähigkeit gegen physische Angriffe
*
L1: Remote-After-Physical
L2: Allgemeine physikalische Robustheit
Gewünschte optionale Anforderungen
Update-Vertraulichkeit
Bitte auswählen:
Schutz vertraulicher Daten - L1: Kein Quanten-Angriff
Schutz vertraulicher Daten - L2: Post-Quantensicher
Verschlüsseltes Update - L1: Kein Quanten-Angriff
Verschlüsselte Aktualisierung - L2: Post-Quantensicher
Nicht erforderlich
Fehlerbehandlung
Bitte auswählen:
Wiederherstellungsmodus
Notfallmodus
Rückfallmodus
Nicht erforderlich
Mehrparteienauthentifizierung
Bitte ankreuzen, falls gewünscht
Hybride Kryptographie
Bitte ankreuzen, falls gewünscht
Weiter