- I
-
Individual software/hardware solution
GRITEC develops effective strategies and innovations to create sustainable added value for our customers.
With passion, our engineers and specialists meet complex challenges with knowledge, skill and innovation.
Our software architects develop concepts and define the best technologies.
Whatever you need - IoT fullstack solutions, Microsoft .NET Core, technologies, responsive designs with HTML and Javascript or Linux embedded solutions with Yocto Project - GRITEC is the right partner.
- Price
- On request
- Technology
- IoT, Azure, Web, Embedded-Solution, Industry 4.0, Smart Factory, Data Analytics, OT-Security, Desktop-Applikationen
- Hosting
- no data
- Company
- GRITEC AG More about the provider
-
IoT with Bluetooth Low Energy
Bluetooth Low Energy (BLE) communications, preferrably based on nordic semiconductor product line (nrf52 series).
We work with BLE 4.0 to 4.2 as well as 5.0.
Based on our custom nrf52 development kit we can quickly prototype your use-cases.
Also, if you barely know you want that Bluetooth thing, we are glad to give you a broad introduction to help you take that leap from the very first steps.
- Price
- On request
- Version
- 4.0
- Technology
- Bluetooth Low Energy, BLE, nrf52832, nrf52840,
- Hosting
- in Switzerland
- Company
- JMR embedded systems GmbH - we make you believe in magic More about the provider
- O
-
OT-Cyber Security IEC-62443
Digitization provides industrial companies with previously unimagined potential - but also confronts them with new challenges.
This also applies to cyber security. Gritec AG supports companies in making their production and products fit for cyber risks.
To do this, it relies on decades of industry expertise, existing standards (IEC-62443) and established strategies.
Services System Assess:
- System Testing/ Scanning
- OT-Infrastructure Check according to IEC 62443
- Consulting OT-Security IEC 62443
- Identification of technical vulnerabilities
Services Protect & Prevent:
- System architecture review
- Risk Assessment, Asset Values definition
- Assessment of processes and procedures
- Consulting for Security by Design
- Definition of effective measures
- Production network security (zoning, firewall, IDS, IPS, DPI)
- Price
- On request
- Technology
- Security IoT, Network Security, Security Consulting, Software for Engineering
- Hosting
- no data
- Company
- GRITEC AG More about the provider
- P
-
Penetration Testing
Cyber Attack Simulation
Through the use of proactive methods, we identify and target security vulnerabilities before they result in a malicious cybersecurity attack, preventing significant damage to your business.
Our comprehensive analysis identifies threat potentials, provides specific security recommendations, and ensures compliance with legal requirements to avoid reputational damage. Our security experts simulate realistic attacks on your systems, web applications, applications, IT infrastructures, mobile devices, IoT and OT, as well as cloud systems, to uncover weaknesses.
- Price
- On request
- Technology
- Blackbox-Tests, Whitebox-Tests, Greybox-Tests
- Hosting
- in Switzerland
- Company
- United Security Providers AG More about the provider
-
Product Development
With us you get tailored product development, professionally executed according to our processes, which also cover functional safety and cyber security.
Leave the tasks from specification & planning, implementation and testing to industrialization and production to us as your product development service provider. Since we take over the entire project management, your employees are freed up for other projects.
We can also take care of product maintenance for you. Since all intellectual property belongs to you at the end of the project, you can also take them over yourself, no lock-in...
- Price
- On request
- Technology
- C, C++, RTOS, Linux, Xamarin
- Hosting
- no data
- Company
- Solcept AG More about the provider
- T
-
ti&m security suite
Security and authorisation is often considered a necessary evil instead of a chance to stand out from competitors.
Security must be easy to use and convenient to avoid threads due to user error. That’s why we put the user into the center of our security solution. There is no need for cryptic passwords or clumsy hardware devices. We simply use the users Smartphone as electronic passport to authenticate the user. Furthermore we protect this passport using modern cryptography and a user selected Pin-Code or his Fingerprint to prevent it from being copied or misused.
The ti&m security suite knows how its users behave and can calculate the probability as to whether the current user is actually the legitimate user. Based on this probability, along with any unusual transactions or payments, it is possible to assess whether or not the current transaction is a risk transaction. If there is a high risk, the user can be informed of unusual activity via push notifications, email, or telephone. All of this in real time, of course.
- Price
- On request
- Hosting
- no data
- Company
- ti&m AG More about the provider