Public Sector

Government and defense clients trust our IT/Cybersecurity experts and Cross Domain Solutions

Digitization affects all public sector domains. IT changes processes, services, capabilities or decision-making. Opportunities for innovation, efficiency and effectiveness gains are enormous. However, information technology also entail risks. Networked organizations and their supply chains, vehicles or other networked devices–the Internet of Things (IoT))–, combined with IT solutions in a state of permanent development and legacy systems, offer ever new attack vectors for bad actors in Cyberspace. The threat from social engineering, phishing, viruses, spyware, malware, ransomware, trojans or advanced persistent threats (APT) is constant and can affect any organization on a daily basis. Just as there can be unintended data loss or system failures. Your public sector organization needs to be prepared for both.

We have been serving the public sector since 1974 with our services and high-end security products

  • BSI certified information security services provider
  • BSI certified information security consultants
  • BSI certified lab for information secruity
  • GEHEIM/ NATO SECRET / EU SECRET accredited products
  • Trusted personnel
  • Independent family-owned

Client projects

Cross Domain Solutions

The Secure Domain Transition (SDoT) product family (hardware security appliances) allows to connect systems of different classification level. Our products ensure that data is made available to classified systems or that data can be securely exchanged between those systems. Only data that is allowed to leave a domain of high classification level can do so. SDoT products use filters for structured data or tamper poof security labels that are cryptographically bound to any data object for release decisions. SDoT cross domain solutions can be found in data centers, weapon systems, simulation environments or downlink stations on land and at sea around the world.

Penetration tests of classified systems

As part of its continuous improvment of the client’s Cybersecurity concept, infodas conducts penetration testing of classified systems. INFODAS uses specially configured audit laptops and a BSI-compliant process model. The tools used include passive scanners (e.g. NMAP) as well as active scans and system interventions (e.g. OpenVAS, Metasploit Framework).

Requirements Engineering

The client wanted to create a “Medical Command & Control System” integrated into an existing C4 system to support the work of medical first responders. In order to ensure that all requirements for the migration and functionality of the integrated system were met, infodas supported the verification process based on the requirements inventory and the generation of test cases.

Implementing an ISMS for a Federal State

All of Germany’s 16 federal states have agreed on common information security objectives based on BSI standard 200-1 – 200-3 (IT Grundschutz) across all of its government agencies and their subsidiaries. infodas Cybersecurity consultant’s are supporting all government bodies across a federal state in the process of planning and implementing an ISMS so that it can maintain a leading role in digitiztion (eGovernment) and information security.