Skip to content

Stable operation without downtime - including protection against cyber attacks

ControlTech Engineering AG (CTE) ensures that standards are maintained and benefits from 30 years of experience in operational technology (OT) infrastructure. Use our external resources for your fail-safe operation. 

Regulatory requirements such as ISO 9001, ISO 45001, ISO 14001 or even ISO 27001 ensure a high level of bureaucracy. Heavy regulation from legislators such as NIS2 Kritis does not make your day-to-day operations any easier either. It is important to focus on the entire IT/OT infrastructure and always keep an eye on the strategy. 

Your advantages at a glance

Holistic emergency plans
As experts in industrial IT, automation and data management, we are your regional partner for operational technologies (OT) and long-term support 
State-of-the-art planning tools
Reliable forecasts based on reliable simulations help you to master daily challenges 
Professional cyber security
A Vulnerability Scan identifies potential attack surfaces and subsequently ensures cyber security

With our security solutions, we ensure fail-safe production operations and the desired cyber security. As a regional partner, we can be at your site quickly and provide close support with our more than 30 years of experience. Dealing with security tasks is part of our everyday life. That's why we proactively answer questions about updates to current technologies and protective measures. In the security sector, good preparation is everything. Minimizing risks with regard to regulations and cyber security helps you to ensure compliance. You can outsource regular security audits, backups and access controls to us without any problems. 

Safe, close-meshed, proactive - up and running!

Read more

A systematic assessment of your IT security risks ensures stable operations without outages and attacks. This increases your security and frees up your internal resources. We support you with detailed security requirements through automated assistance. This saves time and costs. You can focus on the strategy and do not have to concern yourself with the implementation down to the last detail. 

In any case, a cyber incident causes significantly more effort and costs than preventive measures.
Michael Gempp, IT System & Security Architect CTE AG

How your solution is put together -
Focus on the most important components

Click through the interactive graphic:

Network Security
Vulnerability Scan
ICT Assessment
NIS2 Assessment
OT Security Analysis (CTAP)

Network Security

Our industrial cybersecurity portfolio offers comprehensive protection for your systems and facilities - from firewalls to VPN tunnels.

Criminal cyber attacks and threats such as DDoS and ransomware are not trivial. Industrial sites are particularly vulnerable due to their complex network infrastructures and the many interconnected systems. The loss of important data or a production standstill can cause massive financial damage. With our industrial cybersecurity, you are protected. The right system architectures, powerful firewalls and professional support from our experts ensure your security. We can distinguish harmless applications from potentially harmful ones. We also specialize in VPN tunnels (Virtual Private Network).

Vulnerability Scan

We uncover your security gaps with our vulnerability scanner so that your operating processes are well protected.

Our vulnerability scanner is the ideal solution for the security of your OT infrastructure. You gain insight into the security vulnerabilities of your systems and at the same time an assessment of the potential impact on business risk. As OT infrastructures become more complex, the challenge in terms of security and efficiency increases. Is your system landscape up to date? ControlTech Engineering can help your company to protect your production environment and meet compliance requirements. This increases the overall efficiency of your operating processes.

ICT Assessment

We support you in all aspects of ICT security. From analysis and implementation to achieving the ICT minimum standard.

We offer a helping hand for fail-safe OT infrastructure: you can concentrate on your commercial and social management tasks. We get the security regulations for existing and new systems on track, because we are experts in your ICT security. We are familiar with RL CySec-Rail, NIST SP800-82r5 and BSI basic protection and provide support in all areas to achieve the minimum ICT standard. By analyzing the current situation, we identify potential ICT deficits. Our risk and structural analyses allow us to put together a package of solutions tailored to your needs. You will receive an offer of measures at a technical or structural level.

NIS2 Assessment

Would you like to find out what is needed to comply with the EU's NIS2 directive? We analyze your requirements and identify solutions.

The NIS2 Directive on strengthening the cyber security of critical infrastructures is the European Union's new security standard. It significantly expands the scope of the original NIS Directive by tightening security requirements and increasing penalties for violations. Swiss companies that operate in the EU or form part of the supply chain may also be affected. Our NIS2 assessment helps you to identify risks and implement compliance measures - for greater security and legal certainty.

OT Security Analysis (CTAP)

We provide you with a detailed analysis of network traffic, identify threats and show optimization potential for your production networks.

Our OT security analysis identifies threats and unwanted traffic and provides clear recommendations for action to improve your IT and OT security - precisely and without interrupting operations. The analysis is based on Fortinet CTAP technology and uses state-of-the-art tools such as the FortiAnalyzer. The OT security analysis creates transparency, reduces risks and lays the foundation for sustainable protection of your production environment. Invest in a well-founded security assessment and optimize your network infrastructure in a targeted manner.

Our system expertise

We are system-neutral and implement your requirements
regardless of the technology used.

Competence, high-quality solutions and a 100% guarantee of success set CTE apart from other companies.
Thomas Langenegger - Dottikon

Quality is no coincidence - from launch to success
and beyond

From the initial idea to successful commissioning , we accompany you through the entire lifecycle of your automation project - and remain at your side afterwards. Our standardized project process and ISO 9001-certified quality system ensure transparency, the highest quality standards and a partnership you can count on. This is how added value is created!

Concept

In this phase, an analysis is carried out and a rough engineering concept is drawn up.

Specification

This is where the hardware and software planning takes place. The rough concept is developed into a detailed concept.

Implementation

It covers programming, installation, configuration and commissioning.

Verification

Testing and Qualification take place during the process.

Lifecycle management

After going live, system maintenance is carried out on an ongoing basis. We also offer On-Call Service or Spare Parts Service .

No time for details?

Increasing complexity requires new protective measures. This in turn blocks important resources. Possible financial losses or even a loss of reputation due to a production outage must be prevented at all costs. The targeted use of technology helps!

Let us analyze your initial situation together.

Book a non-binding consultation with Michael Gempp, IT Systems Engineer.

Contact us