IT Security.
Incident Response.

We are a specialized company focusing on information security, carrying out penetration tests, supporting our customers with incident response and advising them in the German-speaking countries on information and IT security questions.


Benefit from our many years of experience in the field of IT security.

0 +
0 +
0 +

Our Services

We are a specialized company focusing on information security.
Our main fields of activity include:

Teamfoto cirosec mit Netzwerkwelle

Benefit from our Expertise

In addition to the long-standing experience with customers, several cirosec employees are also known as authors of books and articles. Many of them are also known for giving talks at various events and conferences. Likewise, research is a regular part of our employees’ work.

Has Your System Been Attacked?

If you have been the victim of a cyber attack, contact our specialists. With an appropriate contract, you can reach us 24/7 in an emergency.


All-Around Security

We offer a broad portfolio of various services and are able to respond individually to your needs and requirements.

Security for the Cloud and from the Cloud

We assist you with the creation of concepts, consulting on choosing the most suitable solution, security analyses, and trainings on the security both in the Azure and AWS clouds as well as for Office 365.

Learn more

Protection against Targeted Attacks

If you want to find out how well your company is protected against today’s malware and identify the most useful measures and techniques to reach the level of protection you require, we can help you by creating a malware protection analysis or concept.

Learn more

Vulnerability & Risk Management

We will be happy to support you in designing and selecting a technology that is appropriate for your company and we can also implement it if you wish.

Learn more

Office 365 Security

We consult you about the implementation and secure operation of Office 365. In addition, we offer a two-day training on this topic.

Learn more


We know all the details about these modern approaches and products, as well as their actual effectiveness and their limits. We are happy to assist you in analyzing, designing and implementing suitable protective measures.

Learn more

360-Degree Analysis

The 360-degree analysis aims to gather information on the existing applications, IT infrastructure, protective measures that have been taken and IT-security-relevant processes in an overall context to identify and evaluate potential attack vectors and vulnerabilities.

Learn more

Do you want to protect your systems? Get in touch with us.