Red Team Assessment, Your company from an opponent's perspective
Baseline Security Assessment, Attack Simulation Assessment, Red Team Assessment, Purple Team Assessment. Our Red Team is your partner of choice.

Inside scip AG: Innovation, integrity, and impact
What drives us is not the minimum, but the maximum. We think beyond standards and design security holistically, precisely, and with a clear mission: to identify risks before they arise. To protect systems before they become vulnerable. To empower people before they are threatened. Values protected in their entirety – the need.
This summer break article is intended to give readers a closer look at scip AG. With more than twenty years of experience, thousands of projects, customer interactions, results presentations, company experiences, and much more, there is not nearly enough space to tell even a fraction of the story, let alone do it justice. We look forward to new developments, countless experiences, and moments of insight.
We don’t just work for the moment, we think ahead systematically and invest every day in what will be decisive tomorrow: knowledge that not everyone has yet. Research is not a side issue. It is part of the scip AG DNA, our own ideas, tools, publications, breaking new ground. This culture gives rise to impulses that not only improve our work, but often pave completely new paths and stimulate new thinking. The future is coming, let’s shape it together. Our research areas combine technical expertise, strategic thinking, and social responsibility. The insights we gain flow directly into our projects, methods, and consulting services. We observe, evaluate, and analyze new developments in depth: technologically, socially, and economically.
scip AG invests more than 25% of its annual workload in research.
We have been making contributions from our research and some of our knowledge publicly available since 2003. In the scip AG Research Library, you will find Labs Blogs, which provides first-hand access to research results, while selected content is included in our own and other reference books. In addition, we send our scip Monthly Security Summary to our registered readers, providing monthly updates on what’s happening at scip and in the world of cybersecurity.
Our approach combines offensive security, defensive security, and in-depth research to create a security understanding that can do more: it anticipates, adapts, and continuously evolves.
Whether we delve deep into raw data with systems we have developed ourselves, carry out sophisticated mobile testing projects, promote mutually understandable purple team exercises, or stage red teaming scenarios with surgical precision, we don’t just think outside the box, we redesign it as needed, keeping an eye on the big picture. Uncompromising, analytical, and always focused on the goal. We understand complex relationships and develop our own tools as needed to implement them precisely. Always for the benefit and in the interests of our customers.

Our services are divided into three main areas::
Customers trust us because we are more than just a service provider: we are sparring partners, co-thinkers, and enablers.
Confidentiality is a reality at scip AG. For us, trust does not end at the technical boundary! It begins with attitude and is lived through consistency. Every customer and every project is given a unique synonym so that we can discuss content discreetly and anonymously in public, whether in meetings, on the train, or in a café. Only people who are actively involved in a project have access to it. No exceptions. No compromises.
We think and act with focus. Over the years, we have been able to implement a wide range of complex and unconventional projects. Always with the aim of making security tangible, effective, and of the highest standard.
For example, we analyzed the encrypted communication between a device and a spare part for a leading manufacturer, a technical detail with legal relevance. Our analysis made a decisive contribution to the lawsuit before the European Court of Justice regarding the issue of competition and interoperability.
In a challenging project, we developed our own modular Trojan suite, including a customized command-and-control architecture. This enabled us to simulate high-precision data exfiltration completely undetected and to carry it out within a defined framework. In close coordination with our client group and their legal department, we staged realistic attacks that not only replicated real-life scenarios but also made them tangible, both technically and organizationally. The highest security standards were applied throughout: End-to-end encrypted communication, targeted control of infection paths, isolated data access in protected environments, a predefined disinfection routine, and 24/7 real-time monitoring. This ensured that our tools never fell into the wrong hands. Maximum attention, concrete insights, budget-friendly arguments, and, above all, measurably strengthened resilience.
What all these projects have in common:
Every extraordinary project is an expression of our attitude to always see more, understand more and make more possible.
In addition to customized special projects, we also offer standardized, modular services that can be adapted to the individual needs of our customers in a variety of ways.
Whether as a stand-alone service or as part of a call-off contract, our predefined services for web applications, mobile apps, darknet intelligence, rapid security assessments, and other areas enable us to respond quickly, efficiently, and reliably to security requirements without compromising on quality or depth.
Each of these services is:
For customers, this means: Maximum efficiency, complete transparency, and the certainty of getting exactly what you need. No more, no less, but always at the highest level.
This is just a small selection. Our projects range from hardware-related analyses in industrial plants and modern attack vectors in cloud and mobile environments to socially relevant research in the context of darknet, fake news, and trustworthy AI. Across the entire spectrum of our service areas.

We have no external lenders, no investor interests, and do not sell third-party products. Our recommendations are free from sales pressure. They are neutral, objective, and exclusively committed to the interests of our customers. We advise on what is right, not what sells better. scip AG is 100% self-financed.
This independence has proven its worth: in over 20 years, we have already mastered two global financial crises and a pandemic. And we have done so without compromising on quality, attitude, or substance for our customers. Our resilience is no accident; it is the result of long-term thinking, stable structures, and uncompromising quality standards. Flexible and precise.
We would like to express our sincere thanks to our exceptional employees who stand behind our strategy, understand our philosophy, and live it in their daily work.
Excellence is no accident. It is the result of an attitude. We don’t work for headlines, we work for substance. We don’t just deliver off-the-shelf solutions, we think our way into every challenge. Strategically, deeply, precisely. For us, it’s not about what’s good enough today, but what will still be relevant tomorrow.
We will continue to research, innovate, and implement exciting projects that redefine the standard for cybersecurity. Thanks to this continuous research and development, we are not only strong today, but also well equipped for the challenges of tomorrow. At scip AG, security is not just a promise – it is consistently lived.
For everyone who takes security seriously. Because where others stop thinking, our real project begins.
Our experts will get in contact with you!

Baseline Security Assessment, Attack Simulation Assessment, Red Team Assessment, Purple Team Assessment. Our Red Team is your partner of choice.

Simon Zumstein
Our experts will get in contact with you!