In addition to our perspective as Service Provider, we also have years of experience working on the customer side.
We do not limit our evaluation to individual systems, but instead base our assessment on the holistic threat level of your organization based on your risk profile.
We are vendor independent and specialize in recommending specific measures that are tried and tested, to result in a significant improvement of IT Security in your organization.
The classic cyber-attack on an organization is aimed at the IT Infrastructure. The typical approach of an attacker is a step wise expansion within the corporate network, until full control of the organization’s infrastructure has been gained.
The motivation is often criminal business interests, but can also be cyberactivism.
The vulnerability of products is also increased, particularly due to the increasing degree of connectivity. The technologies used in this case are often simpler than in the traditional IT field, making the possibility of tampering through outsiders more probable. By taking into account the basic IT security rules, this probability can be greatly reduced.
Most countries currently have their own cyber units, not only to defend themselves from cyber-attacks, but also to obtain relevant information to support the local economy. This kind of attack cannot be completely prevented. However, it is possible to protect individual information in such a way that the access by external parties is completely blocked.
We simulate regular cyber-attacks in order to identify the gaps in your network. From these findings, we will develop, together with you, sustainable and continuous improvement measures of your IT Security strategy. We will ensure that these protective measures focus on areas that effectively improve your individual risk situation.
Due to our extensive expertise in analyzing various technologies, we have the capability to evaluate and identify weaknesses in both complex IT Systems, as well as in various industrial appliances related to vehicles and other embedded systems.
We work with you to analyze your critical business assets and, on the basis of their vulnerabilities, we develop a tailored IT Security strategy for you. In this way, we can ensure that your most sensitive assets are really more secure.
We support you in the implementation of the IT Strategy by working with you to come up with concrete solutions on how to achieve the planned targets. Through our continuous support services, we ensure the further development of the strategy and its synchronous implementation, thereby resulting in a continuous improvement process.
Through the comprehensive analysis of your threat situation, we are in a position to provide you tailored and independent suggestions to optimize your IT Security strategy. With our approach, we help you to effectively protect against cyber-attacks on your IT systems.
We work together with you to evaluate your individual security requirements on the basis of your risk appetite. In addition to a comprehensive analysis of your threat situation, we will provide you information on if and how an attacker can breach your organization and how he can steal or manipulate your valuable corporate assets.
You will receive strategic recommendations from us on how you can protect yourself effectively from these cyber-attacks. The advantage of our approach is you have to implement exactly those measures that contribute to an actual and verifiable improvement of your security level.
Security is not a one-time event, but rather a process. We simulate regular cyber-attacks and observe the IT security field for new threats that could be relevant to you. With this information, we can keep you continuously informed and capable of acting quickly and effectively. Through our extensive expertise, we can attack your productive environment, without compromising your operational stability.
We are an organization with a specialized expertise in IT Security consulting based in Stuttgart and Ulm. Our objective is to use our extensive experience in this area to support your organization in proactively improving your IT Security. Based on our years of leadership experience in IT Management (within medium and large corporations), we bring together highly specialized technical know-how with the ability to assess complex environments quickly and effectively.
Andreas Melzner is responsible for the penetration testing services at Code White. In the last 12 years Andreas held various security positions. At Daimler he was responsible for Offensive Security and established the Security Research Laboratory. As Information Security Officer at CAR2GO he was responsible for the security design and strategy in the start up phase. In his last position at Daimler Andreas was responsible for a security service division consisting of six international teams, providing security services globally.
Helmut Mahler is responsible for Code White strategic customer relations. After his Assignment in the IBM Research Laboratory Zurich Helmut Mahler held different leadership positions in the IT Management of Daimler. He took responsibility for Process and Information Management of the former Startup Micro Compact Car which developed the Smart car. His last position was CIO for the Daimler Truck division worldwide.
Lüder Sachse is responsible for the strategic security consulting at Code White. His last position was Chief Information Security Officer (CISO) of Daimler with global responsibility for 150 Information Security Officer and the global Information Security Strategy of the company. Before that he has built up and lead the internal IT Security service unit of a Daimler subsidiary and he has responsibility for IT Service Management and Quality Management units. Lüder has more than 10 years experience in Information Security.
As an ambitious team, we are looking for ambitious talent. We are searching, with immediate effect, for highly motivated and technically competent
Our Red Teams conduct comprehensive Penetration Tests for international organizations: real attack scenarios, minimum restrictions in approach, less automation and the search and exploitation of 0Day Vulnerabilities - these are some of the indications of our approach. From indirect Reconnaissance on covert proceedings to Post Exploitation and Lateral Movement, we identify complete attack paths.
What’s important to us:
In return, we offer:
If interested, we look forward to a compelling application and a personal interview. Contact us.
We are an organization with headquarters in Ulm. We are specialized in the “Intelligence Driven Security” approach. This includes the comprehensive and ongoing IT security analysis for organizations, as well as strategic consulting at the management level.
We offer our customers a combination of years of leadership experience in large companies combined with specialized technical know-how and the ability to assess complex environments quickly and effectively.
We take pride in our employees' skills, due to which, we attach a high importance to making additions to our team. Although this mainly applies to technical skills, individual creativity, enthusiasm and absolute integrity, towards us and our customers, are crucial for us.
In return, we offer our employees an optimized working environment with premium facilities and the chance to be part of something great in an ambitious team.