{"id":45476,"date":"2024-08-05T09:10:24","date_gmt":"2024-08-05T07:10:24","guid":{"rendered":"https:\/\/www.soft-gate.de\/?page_id=45476"},"modified":"2024-10-28T13:30:31","modified_gmt":"2024-10-28T12:30:31","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.soft-gate.de\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<section class=\"l-section wpb_row us_custom_820df3e3 height_medium width_full with_video with_youtube\"><div id=\"us_bg_video_w9aa\" class=\"l-section-video\"><script id=\"us_bg_video_w9aa-script\">!function(w){var node = document.getElementById( 'us_bg_video_w9aa' );if ( w.innerWidth <= 600 ) { node.remove() }}(window);<\/script><style>@media(max-width:600px){#us_bg_video_w9aa{display:none!important}}<\/style><script id=\"youtube_w9aa\">\r\n\t\t\t\t\twindow.USYTPlayers = ( window.USYTPlayers || { initYTFunctions: [], optionsYT: [], USYTInited: false } );\r\n\t\t\t\t\twindow.USYTPlayers.initYTFunctions.push( function() {\r\n\t\t\t\t\t\tvar player = new YT.Player( \"youtube_w9aa\" , {\r\n\t\t\t\t\t\t\tvideoId: \"szBOOJ83EPM\",\r\n\t\t\t\t\t\t\tplayerVars: {\"playlist\":\"szBOOJ83EPM\",\"autohide\":1,\"autoplay\":1,\"mute\":1,\"controls\":0,\"disablekb\":1,\"enablejsapi\":1,\"fs\":0,\"loop\":1,\"rel\":0,\"showinfo\":0},\r\n\t\t\t\t\t\t\tevents: {\r\n\t\t\t\t\t\t\t\tonReady: function ( e ) {\r\n\t\t\t\t\t\t\t\t\te.target.mute();\r\n\t\t\t\t\t\t\t\t\te.target.playVideo();\r\n\t\t\t\t\t\t\t\t\te.target.g.allow = \"autoplay; fullscreen; picture-in-picture\";\r\n\t\t\t\t\t\t\t\t\te.target.g.width = window.innerWidth;\r\n\t\t\t\t\t\t\t\t\te.target.g.loading = \"lazy\";\r\n\t\t\t\t\t\t\t\t\te.target.g.dispatchEvent( new Event( \"resize\", { bubbles: true } ) );\r\n\t\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t});\r\n\t\t\t\t\t\tdocument.querySelector( \"script#youtube_api_w9aa\" ).remove();\r\n\t\t\t\t\t} );\r\n\t\t\t\t\twindow.onYouTubeIframeAPIReady = function() {\r\n\t\t\t\t\t\twindow.USYTPlayers.initYTFunctions.forEach( function( YTPlayer ) {\r\n\t\t\t\t\t\t\tif ( typeof YTPlayer === \"function\" ) {\r\n\t\t\t\t\t\t\t\tYTPlayer();\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t} );\r\n\t\t\t\t\t};\r\n\t\t\t\t\tvar script = document.createElement( \"script\" );\r\n\t\t\t\t\tscript.id = \"youtube_api_w9aa\";\r\n\t\t\t\t\tscript.src = \"https:\/\/www.youtube.com\/iframe_api\";\r\n\t\t\t\t\tdocument.head.append( script );\r\n\t\t\t\t<\/script><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\" style=\"--additional-gap:2rem;\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"g-cols wpb_row us_custom_fe77c1aa via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_eb378dc6 has_text_color\"><div class=\"wpb_wrapper\"><h1>Cyber Security for Medical Products<\/h1>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_b3f36199 us_animate_this height_auto\"><div class=\"l-section-overlay\" style=\"background:var(--color-header-middle-bg)\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_medium\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_4f24afa8 height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_cfdf862e has_text_color us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\"><strong><em>Cyber Security<\/em><\/strong><\/h2>\n<\/div><\/div><div class=\"wpb_text_column us_custom_fbbb98cf has_text_color us_animate_this\"><div class=\"wpb_wrapper\"><p><span data-contrast=\"auto\">In the increasingly interconnected and digitized healthcare industry, users and manufacturers face significant challenges. The expanding attack surface and growing system complexity require a structured approach to cybersecurity. A systematic approach is crucial to meet the rising demands for the security of medical products.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To meet these demands, we at softgate GmbH ensure our cybersecurity measures adhere to current standards:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_40c56b4a us_animate_this height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_cdf14ffd\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_688430c2 has_text_color us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\"><strong><em>Our standards<\/em><\/strong><\/h2>\n<\/div><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_7e20fa79 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"w-ibanner animation_phorcys ratio_1x1 easing_ease\"><div class=\"w-ibanner-h\"><div class=\"w-ibanner-image\" style=\"background-image: url(https:\/\/www.soft-gate.de\/wp-content\/uploads\/ai-medical-cybersecurity-data-safety-healthcare-life-insurance-sectors-1024x585.jpg)\"><\/div><div class=\"w-ibanner-content\"><div class=\"w-ibanner-content-h\"><h2 class=\"w-ibanner-title\">ISO 14971<\/h2><div class=\"w-ibanner-desc\"><p>ISO 14971 was developed by the International Organization for Standardization (ISO).<\/p>\n<p>ISO 14971 is a standard that provides guidelines for the risk management of medical devices. It includes requirements for managing cybersecurity risks in medical devices.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-ibanner us_custom_cdf14ffd animation_phorcys ratio_1x1 easing_ease\"><div class=\"w-ibanner-h\"><div class=\"w-ibanner-image\" style=\"background-image: url(https:\/\/www.soft-gate.de\/wp-content\/uploads\/30758-1011x1024.jpg)\"><\/div><div class=\"w-ibanner-content\"><div class=\"w-ibanner-content-h\"><h2 class=\"w-ibanner-title\">IEC 62304<\/h2><div class=\"w-ibanner-desc\"><p>IEC 62304 is a standard from the International Electrotechnical Commission (IEC) that provides guidelines for software lifecycle processes in the development of medical devices. It also includes requirements for managing cybersecurity risks in medical software.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_4a593b65 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"w-ibanner animation_phorcys ratio_1x1 easing_ease\"><div class=\"w-ibanner-h\"><div class=\"w-ibanner-image\" style=\"background-image: url(https:\/\/www.soft-gate.de\/wp-content\/uploads\/globe-with-blue-world-map-it-1024x1024.jpg)\"><\/div><div class=\"w-ibanner-content\"><div class=\"w-ibanner-content-h\"><h2 class=\"w-ibanner-title\">EU MDR and FDA Guidelines<\/h2><div class=\"w-ibanner-desc\"><p>Ensuring regulatory compliance according to e.g. European (MDR) and US regulations (FDA) for medical device manufacturers. They require to identify and address cybersecurity risks at all stages of product development.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-ibanner us_custom_cdf14ffd animation_phorcys ratio_1x1 easing_ease\"><div class=\"w-ibanner-h\"><div class=\"w-ibanner-image\" style=\"background-image: url(https:\/\/www.soft-gate.de\/wp-content\/uploads\/3834442-1024x1024.jpg)\"><\/div><div class=\"w-ibanner-content\"><div class=\"w-ibanner-content-h\"><h2 class=\"w-ibanner-title\">ISO 81001-5-1<\/h2><div class=\"w-ibanner-desc\"><p>The standard complements IEC 62304 by addressing important aspects of cybersecurity for software used in connected health technologies.<\/p>\n<p>It provides a framework for the activities that must be carried out throughout the entire product lifecycle\u2014from product development to use and ongoing monitoring\u2014to protect against current and future cyber threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_1141a656 has_text_color height_auto\"><div class=\"l-section-overlay\" style=\"background:rgba(255,255,255,0.75)\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container has_bg_color\"><div class=\"vc_column-inner us_custom_859b4484\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_deb09604 has_text_color us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\"><strong>Security Process Description<\/strong><\/h3>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><span>\n<style>\n\t#hotspot-45492 .hotspots-image-container,\n\t#hotspot-45492 .leaflet-container {\n\t\tbackground: #efefef\t}\n\n\t#hotspot-45492 .hotspots-placeholder,\n\t.featherlight .featherlight-content.lightbox-45492 {\n\t\tbackground: #ffffff;\n\t\tborder: 0 #ffffff solid;\n\t\tcolor: #519765;\n\t}\n\n\t#hotspot-45492 .hotspot-title,\n\t#hotspot-45492 .bc-product__title a,\n\t.featherlight .featherlight-content.lightbox-45492 .hotspot-title,\n\t.featherlight .featherlight-content.lightbox-45492 .bc-product__title a {\n\t\tcolor: #519765;\n\t}\n\n\t\t\t#hotspot-45492 .hotspot-style-1 {\n\t\t\tstroke-width: 2;\n\t\t\tfill: #ffffff;\n\t\t\tfill-opacity: 0;\n\t\t\tstroke: #ffffff;\n\t\t\tstroke-opacity: 0;\n\t\t}\n\t\t#hotspot-45492 .hotspot-style-1:hover,\n\t\t#hotspot-45492 .hotspot-style-1:focus-visible,\n\t\t#hotspot-45492 .hotspot-style-1.hotspot-active {\n\t\t\tfill: #ffffff;\n\t\t\tfill-opacity: 0.81;\n\t\t\toutline: none;\n\t\t\tstroke: #ffffff;\n\t\t\tstroke-opacity: 0.16;\n\t\t}\n\t\t\t#hotspot-45492 .hotspot-default {\n\t\t\tstroke-width: 2;\n\t\t\tfill: #ffffff;\n\t\t\tfill-opacity: 0;\n\t\t\tstroke: #ffffff;\n\t\t\tstroke-opacity: 0;\n\t\t}\n\t\t#hotspot-45492 .hotspot-default:hover,\n\t\t#hotspot-45492 .hotspot-default:focus-visible,\n\t\t#hotspot-45492 .hotspot-default.hotspot-active {\n\t\t\tfill: #ffffff;\n\t\t\tfill-opacity: 0.16;\n\t\t\toutline: none;\n\t\t\tstroke: #ffffff;\n\t\t\tstroke-opacity: 0.16;\n\t\t}\n\t\t#hotspot-45492 .leaflet-tooltip,\n\t#hotspot-45492 .leaflet-rrose-content-wrapper {\n\t\tbackground: #ffffff;\n\t\tborder-color: #ffffff;\n\t\tcolor: #519765;\n\t}\n\n\t#hotspot-45492 a.leaflet-rrose-close-button {\n\t\tcolor: #519765;\n\t}\n\n\t#hotspot-45492 .leaflet-rrose-tip {\n\t\tbackground: #ffffff;\n\t}\n\n\t#hotspot-45492 .leaflet-popup-scrolled {\n\t\tborder-bottom-color: #519765;\n\t\tborder-top-color: #519765;\n\t}\n\n\t#hotspot-45492 .leaflet-tooltip-top:before {\n\t\tborder-top-color: #ffffff;\n\t}\n\n\t#hotspot-45492 .leaflet-tooltip-bottom:before {\n\t\tborder-bottom-color: #ffffff;\n\t}\n\t#hotspot-45492 .leaflet-tooltip-left:before {\n\t\tborder-left-color: #ffffff;\n\t}\n\t#hotspot-45492 .leaflet-tooltip-right:before {\n\t\tborder-right-color: #ffffff;\n\t}\n<\/style>\n\n\n\t<div class=\"hotspots-container  layout-tooltip event-hover\" id=\"hotspot-45492\" data-layout=\"tooltip\" data-trigger=\"hover\">\n\t\t<div class=\"hotspots-interaction\">\n\t\t\t<div class=\"hotspots-image-container\">\n\t<img\n\t\twidth=\"2223\"\n\t\theight=\"2223\"\n\t\tsrc=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/CS-Quadratisch-ENG.jpg\"\n\t\talt=\"Protected: Cyber Security ENG\"\n\t\tclass=\"hotspots-image skip-lazy\"\n\t\tusemap=\"#hotspots-image-45492\"\n\t\tdata-image-title=\"Protected: Cyber Security ENG\"\n\t\tdata-image-description=\"\"\n\t\tdata-event-trigger=\"hover\"\n\t\tdata-always-visible=\"false\"\n\t\tdata-id=\"45492\"\n\t\tdata-no-lazy=\"1\"\n\t\tdata-lazy-src=\"\"\n\t\tdata-lazy=\"false\"\n\t\tloading=\"eager\"\n\t\tdata-skip-lazy=\"1\"\n\t\t>\n<\/div>\t\t<\/div>\n\t\t<map name=\"hotspots-image-45492\" class=\"hotspots-map\">\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"polygon\"\n\t\t\t\t\tcoords=\"145,978,145,416,1096,416,1096,978\"\n\t\t\t\t\thref=\"#hotspot-hotspot-45492-0\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Threat Modeling\"\n\t\t\t\t\talt=\"Threat Modeling\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-45492-0\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"polygon\"\n\t\t\t\t\tcoords=\"1121,1008,1121,433,2068,433,2068,1008\"\n\t\t\t\t\thref=\"#hotspot-hotspot-45492-1\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Secure Development Practices\"\n\t\t\t\t\talt=\"Secure Development Practices\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-45492-1\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"polygon\"\n\t\t\t\t\tcoords=\"187,1812,187,1109,992,1109,992,1812\"\n\t\t\t\t\thref=\"#hotspot-hotspot-45492-2\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Vulnerability Management:\"\n\t\t\t\t\talt=\"Vulnerability Management:\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-45492-2\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"polygon\"\n\t\t\t\t\tcoords=\"1241,1818,1241,1101,2084,1101,2084,1818\"\n\t\t\t\t\thref=\"#hotspot-hotspot-45492-3\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Security Testing\"\n\t\t\t\t\talt=\"Security Testing\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-45492-3\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t<\/map>\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-45492-0\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Threat Modeling<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>Using the ANSI\/AAMI SW96:2023 standard, we systematically identify and address potential threats during the design phase. This involves a structured approach to risk assessment and management to ensure comprehensive security coverage throughout the product lifecycle..<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-45492-1\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Secure Development Practices<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>We emphasize adherence to proven security principles throughout the development process, including \"Least Privilege,\" \"Defense in Depth,\" and \"Security by Design.\" Our stringent coding practices minimize vulnerabilities and ensure that our software is robust and resilient against attacks.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-45492-2\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Vulnerability Management:<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>We conduct continuous monitoring and regular security scans to quickly identify and address potential threats, keeping systems secure and compliant.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-45492-3\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Security Testing<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>We utilize techniques such as static and dynamic analysis, as well as advanced security testing, to evaluate and enhance the implementation of security requirements in our products.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_medium\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_7ecd55ce us_animate_this height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_7e20fa79 us_animate_this\"><div class=\"wpb_wrapper\"><h2><span style=\"font-size: 48px;\">Our Expertise<\/span><\/h2>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_1c9bb4a4\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_6f994f2d us_animate_this\"><div class=\"wpb_wrapper\"><p>With many years of experience in cybersecurity for medical products, our team collaborates successfully with leading industry partners and is involved in all process steps\u2014from initial planning and development to risk management, implementation, and continuous monitoring. Below are some examples of our successful projects.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_medium\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_aca6fd9b height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-grid us_grid us_custom_7e20fa79 us_animate_this type_grid layout_13500 cols_3 preload_style_spinner\" id=\"us_grid_1\" style=\"--columns:3;--gap:1.5rem;\" data-filterable=\"true\"><style>@media (max-width:1024px){#us_grid_1{--columns:2!important}}@media (max-width:600px){#us_grid_1{--columns:1!important}}.layout_13500 .w-grid-item-h{background:#f5f5f5;box-shadow:0 0rem 0rem rgba(0,0,0,0.1),0 0rem 0rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch .layout_13500 .w-grid-item-h:hover{box-shadow:0 0.05rem 0.1rem rgba(0,0,0,0.1),0 0.17rem 0.5rem rgba(0,0,0,0.15);z-index:4}.layout_13500 .usg_post_image_1{transition-duration:0.3s;transform-origin:50% 50%;transform:scale(0.85) translate(0%,0%);opacity:0.8}.layout_13500 .w-grid-item-h:focus-within .usg_post_image_1,.layout_13500 .w-grid-item-h:hover .usg_post_image_1{transform:scale(0.95) translate(0%,0%);opacity:1}.layout_13500 .usg_post_title_1{transition-duration:0.3s;transform-origin:50% 50%;transform:scale(1) translate(0%,0%)}.layout_13500 .w-grid-item-h:focus-within .usg_post_title_1,.layout_13500 .w-grid-item-h:hover .usg_post_title_1{transform:scale(1) translate(0%,0%);opacity:1}.layout_13500 .usg_btn_1{transition-duration:0.3s;transform-origin:50% 50%;transform:scale(0.85) translate(0%,0%)}.layout_13500 .w-grid-item-h:focus-within .usg_btn_1,.layout_13500 .w-grid-item-h:hover .usg_btn_1{transform:scale(1) translate(0%,0%);opacity:1}.layout_13500 .usg_hwrapper_2{transition-duration:0.3s;transform-origin:50% 50%;transform:scale(1) translate(0%,0%);opacity:0}.layout_13500 .w-grid-item-h:focus-within .usg_hwrapper_2,.layout_13500 .w-grid-item-h:hover .usg_hwrapper_2{transform:scale(1) translate(0%,0%);opacity:1}.layout_13500 .usg_vwrapper_1{padding-left:1.5rem!important;padding-top:1rem!important;padding-right:1.5rem!important;background:#f5f5f5!important}.layout_13500 .usg_hwrapper_1{padding-bottom:0.3rem!important;border-bottom-width:2px!important;border-color:var(--color-header-middle-text-hover)!important;border-bottom-style:solid!important;background:#e8e8e8!important}.layout_13500 .usg_post_title_1{font-size:19px!important}.layout_13500 .usg_post_content_1{font-size:16px!important}.layout_13500 .usg_btn_1{margin-left:1rem!important}.layout_13500 .usg_hwrapper_2{margin-top:0.5rem!important;border-top-width:1px!important;border-bottom-width:1px!important;border-color:var(--color-header-middle-text-hover)!important;border-top-style:solid!important;border-bottom-style:solid!important;background:var(--color-header-middle-text-hover)!important}<\/style><div class=\"w-grid-list\">\t<article class=\"w-grid-item size_1x1 custom-link post-16568 post type-post status-publish format-standard has-post-thumbnail hentry category-endoscopy category-medical-solution category-medical-technology-reference category-op-en category-uncategorized tag-cyber-security-en\" data-id=\"16568\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/www.soft-gate.de\/en\/16793-2\/\" aria-label=\"Creating a Threat and Risk Analysis\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-hwrapper usg_hwrapper_1 align_none valign_top\" style=\"--hwrapper-gap:0.7rem\"><div class=\"w-post-elm post_image usg_post_image_1 as_circle has_ratio\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/16793-2\/\" aria-label=\"Creating a Threat and Risk Analysis\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/Bild-2.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/><\/a><div style=\"padding-bottom:100%\"><\/div><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_none valign_middle\" style=\"--vwrapper-gap:0.5rem\"><h6 class=\"w-post-elm post_title usg_post_title_1 entry-title\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/16793-2\/\">Creating a Threat and Risk Analysis<\/a><\/h6><div class=\"w-post-elm post_content usg_post_content_1 with_collapsible_content\" data-content-height=\"180px\"><div>We developed a comprehensive threat and risk analysis for an integration platform deployed within the operating room. Utilizing the STRIDE model, we systematically identified Cyber Security risks and subsequently derived&hellip;<\/div><div class=\"toggle-links align_none\"><button class=\"collapsible-content-more\"><\/button><button class=\"collapsible-content-less\"><\/button><\/div><\/div><\/div><div class=\"w-hwrapper usg_hwrapper_2 align_none valign_middle\" style=\"--hwrapper-gap:1.20rem\"><a class=\"w-btn us-btn-style_11 usg_btn_1\" target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/16793-2\/\"><span class=\"w-btn-label\">Read more<\/span><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 custom-link post-16583 post type-post status-publish format-standard has-post-thumbnail hentry category-medical-solution category-medical-technology-reference category-surgery category-uncategorized tag-cyber-security-en\" data-id=\"16583\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.soft-gate.de\/en\/creating-a-threat-and-risk-analysis\/\" aria-label=\"Support during complete SDLC\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-hwrapper usg_hwrapper_1 align_none valign_top\" style=\"--hwrapper-gap:0.7rem\"><div class=\"w-post-elm post_image usg_post_image_1 as_circle has_ratio\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/creating-a-threat-and-risk-analysis\/\" aria-label=\"Support during complete SDLC\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/Cyber-Security-MEdizin-Gersteller.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/><\/a><div style=\"padding-bottom:100%\"><\/div><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_none valign_middle\" style=\"--vwrapper-gap:0.5rem\"><h6 class=\"w-post-elm post_title usg_post_title_1 entry-title\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/creating-a-threat-and-risk-analysis\/\">Support during complete SDLC<\/a><\/h6><div class=\"w-post-elm post_content usg_post_content_1 with_collapsible_content\" data-content-height=\"180px\"><div>We assisted in implementing a Software Development Life Cycle (SDLC) as an integral component of a new product platform for a prominent medical device manufacturer. This encompassed conducting threat and&hellip;<\/div><div class=\"toggle-links align_none\"><button class=\"collapsible-content-more\"><\/button><button class=\"collapsible-content-less\"><\/button><\/div><\/div><\/div><div class=\"w-hwrapper usg_hwrapper_2 align_none valign_middle\" style=\"--hwrapper-gap:1.20rem\"><a class=\"w-btn us-btn-style_11 usg_btn_1\" target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/creating-a-threat-and-risk-analysis\/\"><span class=\"w-btn-label\">Read more<\/span><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item size_1x1 custom-link post-14142 post type-post status-publish format-standard has-post-thumbnail hentry category-medical-solution category-medical-technology-reference tag-connectivity-en tag-cyber-security-en\" data-id=\"14142\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/www.soft-gate.de\/en\/medical-cooperative-platform\/\" aria-label=\"SBOM based vulnerability analysis\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-hwrapper usg_hwrapper_1 align_none valign_top\" style=\"--hwrapper-gap:0.7rem\"><div class=\"w-post-elm post_image usg_post_image_1 as_circle has_ratio\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/medical-cooperative-platform\/\" aria-label=\"SBOM based vulnerability analysis\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/Kooperationsplattform.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/><\/a><div style=\"padding-bottom:100%\"><\/div><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_none valign_middle\" style=\"--vwrapper-gap:0.5rem\"><h6 class=\"w-post-elm post_title usg_post_title_1 entry-title\"><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/medical-cooperative-platform\/\">SBOM based vulnerability analysis<\/a><\/h6><div class=\"w-post-elm post_content usg_post_content_1 with_collapsible_content\" data-content-height=\"180px\"><div>We created a Software Bill of Materials (SW SBOM) and gathered information regarding existing vulnerabilities. In partnership with the customer, we conducted a thorough analysis of the available data, leading&hellip;<\/div><div class=\"toggle-links align_none\"><button class=\"collapsible-content-more\"><\/button><button class=\"collapsible-content-less\"><\/button><\/div><\/div><\/div><div class=\"w-hwrapper usg_hwrapper_2 align_none valign_middle\" style=\"--hwrapper-gap:1.20rem\"><a class=\"w-btn us-btn-style_11 usg_btn_1\" target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.soft-gate.de\/en\/medical-cooperative-platform\/\"><span class=\"w-btn-label\">Read more<\/span><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div>\t<div class=\"w-grid-preloader\">\r\n\t\t<div class=\"g-preloader type_1\">\r\n\t\t\t<div><\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\t\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:1,&quot;pagination&quot;:&quot;none&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;3&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;13500&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;none&quot;,&quot;overriding_link&quot;:&quot;{\\&quot;url\\&quot;:\\&quot;\\&quot;}&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;post_tag&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;cyber-security&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;],&quot;posts_per_page&quot;:&quot;3&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_post_type&quot;:&quot;post&quot;,&quot;us_grid_ajax_index&quot;:1,&quot;us_grid_filter_query_string&quot;:null,&quot;us_grid_index&quot;:1,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><div class=\"w-btn-wrapper align_right\"><a class=\"w-btn us-btn-style_14 us_custom_a65a01f8 us_animate_this\" title=\"Projekt\u00fcbersicht \u2013 Industrie\" href=\"https:\/\/www.soft-gate.de\/en\/project-overview-medical-technology\/\"><span class=\"w-btn-label\">More Use Cases<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><section class=\"l-section wpb_row us_custom_0d15be52 height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_f03ee871\"><div class=\"wpb_wrapper\"><div class=\"w-person us_custom_d4eb7e7d layout_trendy with_socials\" itemscope itemtype=\"https:\/\/schema.org\/Person\"><div class=\"w-person-image\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/neuer-Hintergrund.png\" class=\"attachment-full size-full\" alt=\"\" itemprop=\"image\" srcset=\"https:\/\/www.soft-gate.de\/wp-content\/uploads\/neuer-Hintergrund.png 500w, https:\/\/www.soft-gate.de\/wp-content\/uploads\/neuer-Hintergrund-300x300.png 300w, https:\/\/www.soft-gate.de\/wp-content\/uploads\/neuer-Hintergrund-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><div class=\"img_hover\" style=\"background-image:url(https:\/\/www.soft-gate.de\/wp-content\/uploads\/neuer-Hintergrund-blackwhite.png)\"><\/div><\/div><div class=\"w-person-content\"><h3 itemprop=\"name\" class=\"w-person-name\"><span>Niko Assmann<\/span><\/h3><div class=\"w-person-role\" itemprop=\"jobTitle\">Sales Consultant<\/div><\/div><div class=\"w-person-content-alt\"><div class=\"w-person-links\"><div class=\"w-person-links-list\"><a href=\"mailto:niko.assmann@soft-gate.de\" class=\"w-person-links-item type_email\" title=\"Email\"><i class=\"fas fa-envelope\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container has_bg_color\"><div class=\"vc_column-inner us_custom_0d15be52\"><div class=\"wpb_wrapper\"><h3 class=\"w-text us_custom_bd1cc364 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Contact us:<\/span><\/span><\/h3><div class=\"w-separator us_custom_1da3bb4d size_small with_line width_50 thick_1 style_solid color_primary align_center with_content\"><div class=\"w-separator-h\"><i class=\"fas fa-envelope\"><\/i><\/div><\/div><div class=\"wpb_text_column us_custom_6575dd30 has_text_color\"><div class=\"wpb_wrapper\"><div class=\"\" data-block=\"true\" data-editor=\"ete72\" data-offset-key=\"4roo9-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"4roo9-0-0\">\n<p><span>Are you planning a new project? Whether you&#8217;re building a new application or enhancing an existing one, we provide the expertise to efficiently implement robust, secure, and high-performance software solutions for medical technology.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"We created a Software Bill of Materials (SW SBOM) and gathered information regarding existing vulnerabilities. In partnership with the customer, we conducted a thorough analysis of the available data, leading to the identification of practical mitigations that addressed the observed challenges.","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-45476","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/pages\/45476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/comments?post=45476"}],"version-history":[{"count":13,"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/pages\/45476\/revisions"}],"predecessor-version":[{"id":58947,"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/pages\/45476\/revisions\/58947"}],"wp:attachment":[{"href":"https:\/\/www.soft-gate.de\/en\/wp-json\/wp\/v2\/media?parent=45476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}