APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Managed Services
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Managed Services

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    • SoftScheck
    Previous
    Next

    softScheck: Thinking Security beyond Penetration Testing

    CIO VendorProf. Dr. Hartmut Pohl, CEO
    As the threat landscape evolves, every organization needs to constantly review, evaluate, and manage the impact of these new risks. In line with this requisite, softScheck developed its security testing process (sSTP) in order to enable organizations to identify security loopholes, thereby prevent their systems from an attack (exploit) and avoid the occurrence of similar confrontations. Since its inception in 2001 as a security research Information Security Institute, softScheck has always been a research-driven security testing company with one goal: promotion of software security from inception to completion and in compliance with recognized industry guidelines such as ISO27034 & Microsoft Security Dev. Lifecycle.

    Besides classical penetration testing offered by the ISO 27034-based Security Testing Process, softScheck also provides ISO 2700x, German IT security baseline, along with OWASP, CWE, SANS, NIST, PTES, OSSTMM and such other best practices of various security assessments. The company is also a proud audit partner for the security testing certification of TÜV Saarland and DEKRA, both Germany-based, global testing, certification, inspection, and training providers.

    While every organization continues to lament about attacks on IT systems, little has been done to eliminate the vulnerabilities that are exploited to set an attack in motion. softScheck’s core competency lies in providing a comprehensive Security Testing as a Service that is mapped directly from the softScheck sSTP, securing everything from software, firmware, apps and systems, to networks, servers, blockchains, and smart contracts.
    The process involves security by design, which implies providing a security architecture review of the software and network system. Moreover, threat modeling involves identification of potential vulnerability of the system architecture. This is followed by Static Source Code Analysis that implies the static identification of vulnerabilities on source code level. A combination of a manual and an automatic solution, Static Source Code Analysis focuses on finding errors in authentication, authorization, security configuration, and session management along with logging, data validation, error handling, and encryption of data.

    softScheck’s Penetration Testing involves an authorized simulated attack on a computer system, which is performed to evaluate the level of security of the system. This test is performed in order to identify the vulnerabilities as well as the strengths of the system. The company’s penetration testing process also includes the potential for unauthorized parties to gain access to the system's features and data, as well as strengths, enabling a full risk assessment to be completed. From a fuzz testing standpoint, softScheck’s Fuzzing encompasses a dynamic analysis that emphasizes testing the executable, compiled programming code, eliminating the need for a source code(Black Box). “softScheck uses around 50 fuzzing tools as per requirement for the smooth functioning of the process from more than 300 tools, which are effective in diagnosing different vulnerabilities,” says Prof. Dr. Hartmut Pohl, CEO, softScheck.

    softScheck takes pride in their Red Team Services, which does not limit itself to the scope allowed by the conventional penetration test. Besides focusing on the core features of the testing process, the team also addresses the drawbacks arising from the same. The major objective of a Red Team Assessment is not just to identify vulnerabilities in the security system; it also assesses the client organization's detection and response capabilities. Through wireless methods, external methods, and social engineering, the team gleans sensitive information in the most dexterous way possible and emulates malicious elements such as Advanced Persistent Threat (APT), which try to avoid detection. softScheck prescribes a Red Team Assessment only to organizations with mature security programs.“With our Red Team as a service, the security maturity of an organization will further be tested to reach its highest maturity,” extols Pohl.

    With an aim to extenuate malicious threats from the security landscape, softScheck is currently focusing on the advancement of their products and disseminating them among their target audience.
    Previous
    Next
    Share this Article:
    Tweet

    softScheck Info

    Company
    softScheck

    Headquarters
    .

    Management
    Prof. Dr. Hartmut Pohl, CEO

    Description
    Leading provider of IT security solutions involving highest level of product penetration testing, general applications, and network penetration testing

    2018

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    CIO Speaks

    Previous Next
    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It

    Gilad Raz, CIO, Varonis

    Top 3 Challenges Growing Businesses Face and How the Cloud Can Help

    Ken Shulman, CIO & CTO, Broadview Networks

    Cloud Security Grows Up

    Kevin Winter, VP & CIO, Booz Allen Hamilton

    Corporate Considerations: Dispelling the Myths of Cyber Security

    Neil Jarvis, CIO, Fujitsu America, Inc

    Moving towards an Intelligent, networked and boundary less world

    Rajeev Batra, CIO, MTS India

    The Right Technology And Reliable Partners; The Business Next Frontier

    Luke O'Brien, CIO, ISS Facility Services Australia & New Zealand

    Service Organisations Make Great Places To Work, And Deliver Better Value

    Matthew Perry, CIO, Orora Limited [ASX: ORA]

    How Have Recent Advancements in Big Data Been Impacting Businesses?

    Marc Solomon, CIO, Bvn Architecture

    BI & Analytics in Aquaculture

    Matthew Leary, CIO, Tassal Operations

    BI and Analytics

    Gary Peel, CIO, SYNERGY (ASX:IS3)

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/vendor/softscheck-thinking-security-beyond-penetration-testing-cid-3287-mid-162.html