IT Security and Data Protection

IT security and data protection have long since become a condition of new technical systems. Companies need to protect themselves against cyber attacks and at the same time ensure the data protection of the stored data. In research, too, the handling of collected data plays a significant role. Our services are aimed at a wide range of companies and research projects, from information systems to critical infrastructures. You can find more information in our Science-Journal visIT Privacy by Design and IT Security

Privacy warning

With the click on the play button an external video from is loaded and started. Your data is possible transferred and stored to third party. Do not start the video if you disagree. Find more about the youtube privacy statement under the following link:

In short, why do people need data usage controls? (Video in German language)

Our competences for your project

  • In-depth technical consulting on IT security and data protection topics (DSGVO and others) in the production environment and for research designs
  • Consulting and integration of data protection components in technical systems or technical working environments
  • Secure, self-determined data exchange of own data with third parties
  • Privacy by design from the very beginning: Our systems (e.g. for authentication, images or video data) are already designed at the design stage in such a way that the data protection of data subjects is guaranteed.  

Our projects and products for IT security and data protection


4Crypt Video

With this flexibly applicable authentication procedure, critical work steps (e.g. in production) can be documented securely and in compliance with data protection requirements for all parties involved.



In projects involving human-technology interaction, there is a lot to consider in terms of data protection. In this guide by Fraunhofer IOSB and Bielefeld University of Applied Sciences, scientists will find helpful guidelines. 



User-friendly and very secure – our password manager consists of two components, an app for mobile devices and a hardware adapter that is recognized as a USB keyboard.



The Competence Center for Applied Security Technology is one of three competence centers for cyber security initiated by the BMBF. The focus is on the overall security of specific application areas such as power grids or smart factories.


Industrial Data Space

The secure peer-to-peer network enables companies to exchange data with third parties in a sovereign manner. The data owner retains self-determined control over the use of his data.