Get in touch

Complex software can be vulnerable to a variety of attack vectors. We protect.

In an expanding and evolving digital world, cybersecurity becomes an ever more complex task. At AOE, we have many years's experience in protecting the most valuable assets – from data to software – and implementing security throughout the whole development lifecycle.

AOE Academy:
OWASP Top 10 Training.
Hands-on Training, Interactive Lab & Live Hack.

Thinking like a hacker: Our interactive AOE Academy Training gives insights on how to exploit and prevent the 10 most common security vulnerabilities in web applications in a one-day workshop.

Building on our experience

Identity
Management

Get securely organzied, from roles and permissions to OpenID Connect and zero trust architecture.

Get more details

DevSecOps Consulting

How to implement security in agile projects, protect microservices, train developers and do pen tests.

Get more details

Web Application Security

Benefit from AOE's years of experience in securing and operating enterprise platforms and E-Commerce projects.

Get more details

Microservice &
Cloud Native

Trust in our experience to run and secure microservice workloads on elastic infrastructure.
 

Get more details

AOE is a member of cybersecurity initiatives

Bastian Ike

Bastian Ike

Director Cybersecurity / AOE
Security is more than crossing fingers. Ideally you start a project with a security strategy from the very beginning. Then keep on learning, adapting and improving."

Identity management

Decentralized infrastructure is developing at a fast pace. This means a strong and centralized identity management is necessary to keep up with security controls and requirements across projects and companies. Zero trust architecture, inspired by Google’s BeyondCorp, is our go-to choice when it comes to implementing holistic identity management. Our core expertise is built upon OpenID Connect and OAuth 2.0 with Keycloak as a central building block in our security architecture.

Give us a call if your identity management is lacking crucial key features, or if you need help implementing Keycloak or defining your roles and permissions.

DevSecOps consulting

Unfortunately, security does not scale well with decentralized development and agile teams. We help our customers from a broad range of industries such as telco and aviation to implement security in their agile development and operations processes. API gateways, identity propagation and secure microservice communication are just a few of our core competences when it comes to DevSecOps.

Let us know if you need developer training, pen testing or an advisor for a secure project architecture.

Microservice & cloud native

Kubernetes is a state-of-the-art system for running workloads on distributed systems, and Docker changed the way developers work. Although this approach is better than classic software development in many ways, it is not easy to implement a unified security concept to cover heterogeneous environments and comply with legal requirements.

As early adopters of Kubernetes and container technology for our microservices environment we know how to run, secure and monitor while keeping the complexity away from developers. Do you have the feeling we can help you, too?

Web application security

Running online shops is easier than ever, but keeping up with those who earn a living from stealing credit cards, data, and credentials is a tough race. We rely on many years of experience in both protecting and running secure high-scale E-Commerce projects in production.

E-mail us to start a conversation about your E-Commerce project

Our cybersecurity expertise

Application Security
technologies
Platform Security
Secure Architecture
BeyondCorp
Risk Assessment
OWASP Top 10
Security Audit
Test & Code Reviews
Security Training

Get in touch with our AOE cybersecurity experts

Bastian Ike
Steffen Ritter
Daniel Pötzinger

Get in touch

We're keen to hear from you on how
we can help you solve your digital
challenges and prepare for change.