We protect you! Public sector.

In an increasingly digitalized and networked world, public authorities, agencies and political institutions are faced with the challenge of having to secure complex IT structures. The threat situation is increasing rapidly. Organizations and their supply chains, vehicles or other networked devices and combined IT solutions are increasingly becoming the target of cybercriminals. The threat of social engineering, phishing, viruses, spyware, malware, ransomware, Trojans or advanced persistent threats (APT) is constant and can affect any organization on a daily basis. Similar risks from unintentional data loss or system failure also need to be prepared for. The digitalization of the public sector does, however, bring with it the enormous opportunities of increased innovation and efficiency. For over 50 years, we have specialized in providing you with comprehensive advice and support in mastering the challenges and uncovering the potential.

Our BSI-approved cyber- and IT specialists work with you to develop tailor-made security solutions for your individual requirements. Rely on our expertise and extensive, certified product and consulting portfolio to protect your IT infrastructure and ensure the integrity of your sensitive data. Together, we will shape a secure digital future.

Fraud in 2023, the increase in data theft cases worldwide. More than 350 million people were affected*
Experts estimate the global damage caused by cyberattacks at this amount by 2025*
The percentage of companies that do not see themselves in a position to reduce their weak points*

Why infodas?

Cybersecurity Made in Germany

We have been an established partner of the German Armed Forces and the defense industry for 50 years and are experts in securing the highest levels of classified information.

The highest security standards

Our SDoT product family has been proven to meet the highest IT cybersecurity requirements and has approvals up to NATO SECRET.

A holistic consulting approach

BSI-certified experts work together across disciplines to provide you with customized and context-based consulting services.

Impartial and independent

Our consultants focus on your individual requirements and are committed to providing impartial and product-independent advice.

Our certifications

This is how we can help you.

Use cases.


The Secure Domain Transition (SDoT) products (hardware appliances) allow the connection of differently classified systems with each other. Our products ensure that only information that has previously been automatically or manually approved leaves the protected area. In technical terms, the check is based on sets of rules and security labels with strong cryptographic properties. SDoT products can be found in data centers as well as in command and control systems.

As part of the continuous updating of a public client’s IT security concept and the associated review of security measures, annual penetration tests were carried out on the existing systems. We operated with specially configured audit notebooks and a BSI-compliant procedure model for testing classified systems. The tools used included passive scanners (e.g. NMAP) as well as active scans and system interventions (OpenVAS, Metasploit Framework and other tools). Close cooperation with the client, system users and administrators in combination with our powerful test solutions for classified systems made it possible to confirm the security of the system.

To support the ambulance service rescue chain, a “medical service command and deployment system” was created, which was to be integrated into an existing command information system. In order to ensure that all requirements for the migration and functionality of the integrated system were met, we provided support in the verification process based on the existing requirements and the creation of test cases.

In the IT Planning Council, the federal states have agreed on a guideline for information security in public administration. This presents every state administration with the challenge of establishing a holistic information security management system (ISMS) across all departments based on IT baseline protection. To this end, we have developed guidelines and sample documentation in close consultation with information security officers from all departments and supported the stakeholders in the implementation planning and further steps of the ISMS. This has enabled the state administration to further expand its pioneering role in the fields of digitalization and information security.

Due to the IT security requirements of the German Federal Motor Transport Authority (KBA) for Internet-based vehicle registration (i-Kfz), our customer was under pressure to act. A penetration test we carried out revealed technical and organizational weaknesses in the provision of the iKfZ procedure. These posed a risk to approval by the KBA and would have massively hindered the approval process as a result. In an interdisciplinary project, not only the organizational deficiencies were initiated and monitored by optimizing the ISMS, but also the technical implementation of security measures. This made it possible to fully cover the requirements and obtain approval for the procedure from the KBA within a short space of time.

News.

Interview in NITECH: The National Secure Cloud

As part of a strong consortium, the National Secure Cloud (NSC) is committed to ensuring the usability of cloud technologies up to the classification level DEU SECRET. Only technologies that…