Reply is the place to meet an incredible variety of enthusiastic, passionate, ideas-driven people, who want to make a difference and an impact.Would you like to know more?
The rapid adoption of digital technologies is helping to implement new and disruptive business models
and processes. However, every change comes with risks – and cyber attacks are one of the
biggest risk factors for today's economy. At the Cyber Security Lab, companies have
access to the latest security solutions and tools that help to safeguard the values and privacy of
people, companies and processes. It includes stations for testing and simulating attack vectors,
threat modelling, controller and device hacking on industry-standard hardware and software
Visit our Cyber Security Lab and learn about adaptive cloud security, secure software
security-driven network infrastructures, application and data security as well as security
assessments for various use cases to avoid disruption to existing cyber security models as companies
adopt agile development, cloud computing and remote working.
Industrie 4.0 stands for the steadily growing intelligent networking of machines and processes
through digitalisation. This makes highly automated production facilities an easy target for cyber
attacks. Companies need comprehensive IT security without compromising production performance to
benefit from integrated manufacturing systems while minimising the threats.
SCADA / ICS / Industry 4.0Cyber Security
Process Control andAutomation in OT
Attack Vectors Simulation
Security Assessment andThreat Modelling
Cyber Security inManufacturing and OT/ICS
The Internet of Things has become an integral part of our lives. As products become more connected
(many of them supported by 5G technology) generating and processing large amounts of data, they
become targets for cyber attacks. (I)IoT security, connectivity and secure edge computing technology
are therefore becoming increasingly important.
5G, SD-WAN, SDN, SDR,WIFI, LoRaWAN
Bluetooth, BLE, MQTT,ZigBee, LwM2M
ODB2, CAN Bus, ECUs
NGX Firewalling, Honeypots,Industry IDS
Secure Software DevelopmentLifecycle (SSDLC)
In smart buildings, technical systems and components must be connected and processes digitised, to
allow, for example, the access for remote operators. On the other hand, the network can get more
insecure than originally closed systems: attackers can use the increasing networking and dynamics to
penetrate systems, misuse connected devices and cause actual damage.
Cyber Security in BuildingAutomation
BACnet Attack Vectors andWeaknesses
Controller and DeviceHacking
Effectively combating cyber threats requires talent as well as new technologies like AI. The use of
AI helps to reliably protect data. Applications range from detecting anomalies or malicious
entities, to implementing security information and event management systems (SIEM) and in anti-virus
products, to use in incident response or anti-spam. AI also supports continuous testing and usefully
complements the manual pretesting that is necessary in the new agile world.
AI helps solve problems through streamlining and automation. Security experts are able to use AI to
deploy resources more effectively and efficiently. In addition, predictions are possible to
establish predictive security. AI is crucial to score efficiently against malware. These tools are
getting better and better and relieve the burden on staff who can devote themselves to complex tasks
and should therefore be included in any security strategy.
Spike Reply is the company within the Reply Group focusing on cyber security and personal data protection. Its mission is to safeguard the values and privacy of people, companies and processes in order to support the growth of a global, sustainable digital world through innovation. Confidentiality, integrity and availability of systems are top priorities. Together with its partners, the company provides vendor-independent consulting services to help enterprises achieve a group-wide, security-oriented culture.
Tel: +49 221 9544660
To facilitate operational streamlining, security related platform services (PaaS) are becoming increasingly more popular, in order to support the often existing (multi-)cloud setup. A traditional and crucial part of IT security is the Public Key Infrastructure (PKI). Spike Reply outlines the advantages and disadvantages of moving it into the cloud.
Spike Reply offers clients a Cyber Security Command Center specialized to services for AWS which is continuously improved to ensure comprehensive protection.
Reply Cyber Security Challenge is a team competition open to both students and professionals created by the “Keen Minds Team”, Reply’s group of Cyber Security experts.challenges.reply.comSTAY TUNED!
Risk-Based Threat and Vulnerability Management is the combination of methods and tools to check your security control effectiveness and your risk posture. Discover new methods and tools to check your security control effectiveness.
Smart factories, smart grids, smart cities… a new world arises, where things communicate with each other. Reply’s IoT Security Test Unit helps to demonstrate and test possible attacks so organisations can react fast to security issues and reduce risks of production outages.
A new privacy and data protection regime is going to be applied, starting from 25 May 2018, imposing strict fines up to € 20 million and the 4% of the global group turnover. Getting ready for GDPR (General Data Protection Regulation) is not an one-off project, but it requires an advanced analysis of the company assets and needs.
In this session Spike Reply provides an overview on AI based breach and attack simulation including advice on how to leverage threat intelligence. Learn about the benefits of using a blend of professional and managed services to reduce your attack surface.
Reply has developed an integrated, consistent and complete offering to support its clients in devising strategies and implementing solutions for business security. Supported by over 200 highly specialised experts at the main international institutes and bodies, with over 200 qualifications between them in the principal technologies and solutions, Reply’s information-security portfolio has two cornerstones: security governance and security technology. Our delivery model integrates and synergises these different but closely related dimensions of information security in a global approach to the various issues in business security.
Our offering stands out for its use of cutting-edge components. We use our innovation and lateral thinking to stay one step ahead, in order to support our clients to best effect as the business security world evolves.
A multinational telecommunications company has set up a GSOC together with the security experts from Spike Reply with the aim of ensuring increased visibility and faster response times to IT security incidents. Cyber attacks no longer stand a chance: The Group's IT infrastructures are now subject to centralised 24/7 international monitoring.
Serverless computing increases your company’s agility and innovation by allowing it to focus on delivering value to customers rather than infrastructure operations. In this session,
Spike Reply goes through a brief introduction to serverless computing, followed by a deep dive into its security.