ERNW SecTools GmbH is the youngest member of the ERNW family. It broadens the ERNW portfolio by developing IT security related software as measured by our own high standards.
Following our belief that knowledge must be shared, ERNW Insight focuses on finding and developing the best ways to make ERNW knowledge accessible to all (e.g. by hosting ERNW’s TROOPERS conference).
We have lined up to change something in the way how soft- and hardware is build today. For decades we have spotted vulnerabilities in soft- and hardware and for decades nothing changed, so it is time that our vision of secure soft- and hardware becomes reality.
In the 19th century we had a similar situation with electricity. There were a lot of accidents,because people didn’t know how to use electricity in a secure manner, but that changed after improvement of the technology. Engineers developed and implemented safety features to avoid these accidents and nowadays usage of electricity is almost safe.
We are here to do the same within the world of information technology.
ERNW Sectools will provide tools that will make IT environments a safer place. We are engineering our knowledge, experience and expertise into new security tools and we will ensure, that our tools will be designed and developed in a secure manner, so they won’t become a weak link in customer environments.
We will design our products in a way, that they will fit into our customer environments, without lowering their actual level of security.
Our products will be delivered „secure by default”, no additional hardening is required, no costly work to determine, what security features can be enabled and which one not.
If we have raised your attention, do not hesitate to contact us. We want to make the world a safer place and we would like to start making your IT environment a safer place.
Your support is needed to let our vision come true.
Last week Will “harmj0y” Schroeder published an excellent technical article titled “Not A Security Boundary: Breaking Forest Trusts” in which he lays out how a highly critical security compromise can be achieved across a forest boundary, resulting from a combination of default AD (security) settings and a novel attack method. His post is a follow-up […]