Your Partner for a Secure Future

Specialized in Information Security

Security is our Business

There is a simple reason why Global 2000 companies work with us: We are the specialists providing rock-solid know-how. Our teams are able to provide excellent results in a variety of fields, ranging from technical security tests to advanced research assignments.

We will address your individual needs and will tackle complex projects with utmost efficiency and reliability. Let us work for your advantage – Get in touch with us!

Offense

Offense

Defense

Defense

Research

Research

Are you ready?

Our experts will get in contact with you!

Convincing Performances

Results in Perfection

Results matter. We deliver facts and explain the possibilities they offer. This is the reason our experts get invited by conferences from all around the world to share their experience and knowledge. We are presenting the latest results from advanced research projects. That is the rerason why we are always a step ahead. That is important.

hwz
bsides lisbon
universitaet luzern
paul scherrer institut psi
iaa
epfl lausanne
dgps
basel life
ignite zuerich
swiss engineering
area41
isss
brocher foundation
swiss certified ict leaders
hslu
ikf luzern
grand resort bad ragaz
harbourclub
fricktal
datenschutz-forum schweiz
university st gallen
dpulse
brucon
amt fuer informatik graubuenden
epfl amld
digicomp
eotec
vspa
sigs
university of amsterdam

You are looking for a speaker?

Künstliche Intelligenz oder die Frage des Vertrauens

Künstliche Intelligenz oder die Frage des Vertrauens: Wir Menschen werden noch gebraucht

Read now

Take a look behind the Curtain

Advanced details explained in Interviews

In a changing world, details are crucial. Technological progress and international exchanges make transitions even faster. Our specialists are well-established correspondents and interview guests for matters of information security, often shedding light on information that would otherwise be overlooked or misinterpreted.

rabe radio bern
arzt spital pflege
tilllate
coop rechtsschutz
rtl2
the ladyboss
otx world
oltner tagblatt
radio argovia
watson
srf
digitec galaxus
ticinonline
schweizer monat
hessischer rundfunk
der bund
radio energy
nzz
swiss it magazine
tele top
radio srf3
10vor10
tele ch
basellandschaftliche zeitung
le matin
aargauer zeitung
lessentiel
blick
nau ch
wondercoders

You are looking for an interview partner?

More than 15 years pushing forward

Reliability and sustainability guarantee success

scip AG was founded in 2002 in the city of Zürich, Switzerland. The acronym scip stands for Security, Consulting, Information and Process. This should emphasize our focus on systematic consulting in information security. From there, it wasn’t long before our slogan Security is our Business cemented itself.

In order to tackle information security, we need to be able to recognize vulnerabilities. Thus, auditing served as a first tentpole of our company that had its first offices in Zürich’s Technopark. Apart from supporting open source projects, we started developing our own vulnerability scanning and exploitation framework in order to efficiently find and effectively exploit vulnerabilities.

Almost fifteen years ago, the IT landscape looked completely different and very few companies had realized the importance and use of being able to systematically assess risks. Since then, the industry has grown, as have we with our clients. During the early years of the company, two thirds of our work were in the financial sector. It was the first sector to – first because of their own agency, then because of legal reasons – recognize the risks in IT. This awareness has spread to other industries. Our international clientele works in all industries, from government to public offices to insurance, pharmaceuticals, chemistry and health to other areas of industry. Their demands are basically the same, but industry specific thinking becomes important when dealing with the unique needs or a client, which is a skill that we hone by supporting our clients.

We aim at long term solutions in all our endeavors, that might sound archaic. It became clear quickly that we would remain completely self-financed and stocks could only be in possession of our employees. This ensures that external stakeholders can’t influence us and we can maintain a maximum of flexibility in an industry that changes rapidly.

Due to this approach ideas, proof-of-concepts and prototypes can be developed without having to think of revenue. This conscious decision allowed us to encourage and drive internal and, later, public research and development. Among the results is our own vulnerability database that chronicles all vulnerabilities ever published, starting in 1979. The database serves as a knowledge base for our penetration testers and consultants and clients, partners, companies and the public use it to gain knowledge, understand attack vectors and reference vulnerabilities use.

Success of a company is dependent on its employees. Long term thinking is of course important in that regard as well and we aim for steadiness in order to keep personnel fluctuation as low as possible. We only employ full time employees and do not work with freelancers for security reasons. All our staff goes through security checks, which ensures a maximum of integrity.

Motivation for employees is gained by them having fun at work and facing new challenges frequently. Per week, they use a day to research own projects. They have developed methods and solutions that range from facilitating document creation to an internal system to safely exchange large files. Or they tackle research ordered by clients. Subjects such as drones, wearables and the Internet of Things remain areas of great interests among our clients and our staff. Information security is not limited to firewalls, viruses and patches. We live in the age of information and everything that uses electronic data is interesting to us.

The consequence of our continued research leads to a high number of publizised documents. We’ve published one such document a week for seven years now on our company blog. The number of clicks and the amount of feedback on it prove us right in our publishing efforts. Our employees go to international conferences, help organize them, hold talks or engage in panel discussions. This helps us remain on the cutting edge of time and technology, to recognize trends early on and to react to them. Some things have remained the same for 3000 years: Secrets want to be protected, necessitating cryptographic and steganographic tools. Others change on a daily basis such as attack vectors or geopolitical influences in the field of cyber security.

Our internal research division goes one step further. By exchanging information with co-workers, clients, partners, industry insiders and experts we aim to recognize future trends. We’re one step ahead, which leads to an immediate profit for our clients. The research division’s slogan isn’t Know the Future! for nothing.

Three years ago, we’ve started collecting our most exciting and most current research articles and publishing them in a printed book and making it available as an E-Book. We hope to give you a bit of insight into our daily work and that you have as much fun reading as we had researching and writing. We live in incredibly interesting times. And we should make use of them.

Book

Book

Publication of our best articles and papers as a book

Magazine

Magazine

Monthly released magazine containing news and articles

Blog

Blog

Weekly published articles in our own research blog

Our Books are convincing

The best articles from one year of research

Issue 13

Issue 13

ISBN 978-3-907109-31-1
Foreword by Dr. iur. David Vasella, Partner, Walder Wyss Ltd.

Issue 12

Issue 12

ISBN 978-3-907109-27-4
Foreword by Marko Rogge, IT Security Officer Mobile Security, Deutsche Bahn AG

Issue 11

Issue 11

ISBN 978-3-907109-23-6
Exclusive e-book version with additional contents

Issue 10

Issue 10

ISBN 978-3-907109-19-9
Foreword by the executive board addressing the anniversary edition

Issue 9

Issue 9

ISBN 978-3-9524389-9-2
Foreword by Igor Brodnik, Chief Information Security Officer, Lonza

Issue 8

Issue 8

ISBN 978-3-9524389-7-8
Foreword by Ivan Büchi, Head of Digital Office, Cantonal Bank of Glarus

Issue 7

Issue 7

ISBN 978-3-9524389-5-4
Foreword by Pascal Adam, CISO, Parliament Services Switzerland

Issue 6

Issue 6

ISBN 978-3-9524389-2-3
Foreword by Erwin Jud, Senior Security Engineer, SBB Infrastructure AG

Issue 5

Issue 5

ISBN 978-3-03-04327-5
Foreword by Candid Wüest, Threat Researcher, Symantec

Stay informed

Subscribe to our monthly security summary

Do you know our new book about AI

Buy it on Amazon now!

×