
IT security consulting
IT security consulting: get started before something happens
A sound cybersecurity strategy is based on an analysis of the existing risks and threat situation. MaibornWolff supports you in finding, defining and implementing the necessary measures to defend against and respond to emergencies: from complying with strict security standards and overcoming complex technical challenges to empowering your employees to minimize risks themselves.
Whether your motivation to seek advice stems from an upcoming certification(ISO 27001, UNECE R155, IEC 62344, etc.), a legal requirement (NIS 2) or a security incident in the past: We help you to achieve a level of security appropriate to the risk that meets legal and certification requirements.
Implementation at the right pace
We offer customized solutions that are established at a pace that suits the customer.
People-centered approach
People are at the center of all our technological and strategic considerations.
Holistic security strategy
We optimize your IT security not only from a technical perspective, but also from a strategic one.
Extensive expertise
With around 1,000 employees from various specialist areas, we have a wide range of experts at our disposal

Why MaibornWolff in particular?
MaibornWolff positions itself as your strategic partner, ensuring that IT security and business development go hand in hand. We build the bridge from pure governance and compliance with standards to predictable, scalable and, above all, implementable cybersecurity, including individual software development if necessary.
Quick recommendations for action and support with certifications
As a company that offers the complete software engineering lifecycle, we can quickly analyze the threat and risk situation in your company. We usually present concrete recommendations for action within a few weeks - especially when it comes to achieving demanding certifications such as ISO 27001 or UNECE R 155.

Crucial to the success of the project: the team did not try to bring security into the development teams from outside in a 'police role'. Instead, it empowered our teams themselves to systematically assess security.
Our references & projects
A reference is worth more than 1,000 words. Fortunately, we have dozens of them. Click through a selection of our most exciting projects and see for yourself!
-
MAN: Efficient threat analysis for control unitsLearn more
Digitalization increases cyber risks - especially for MAN's new CM4 control unit. Our experts use the 4×6 methodology and ThreatSea to identify threats at an early stage and develop targeted protective measures. Find out how MAN uses intelligent risk analysis to strengthen the security of its vehicles.
MAN: Efficient threat analysis for control unitsLearn more7 monthsProject duration
Over 20 workshopsThreat analyses
Over 500Potential risks evaluated
-
Siemens: AI demand prediction platform for industrial production planningRead more
Siemens is looking to the future with the AI Demand Prediction Platform. Thanks to machine learning and AutoML, precise demand forecasts can be created for over 100 products and production can be better planned. Launched as a proof of concept, the platform quickly developed into a system that can be used productively. The self-service web application will soon be used in other plants.
Siemens: AI demand prediction platform for industrial production planningRead moreProject durationSince February 2022
Proof of conceptin a few weeks
Time series predictionfor 100 different products
-
TÜV NORD GPT: Development of AI assistanceRead more
Find relevant information faster by chatting with documents? It's possible! The TÜV NORD GROUP uses GPT technology in the secure Microsoft Azure Cloud. With the aim of optimizing knowledge management and efficiency. The system enables new usage options within the testing group and is operated securely. Find out more about the innovative AI assistance system now.
TÜV NORD GPT: Development of AI assistanceRead moreProject durationsince September 2023
33.000GPT applications in the first month
ChatGPT Model 4in the European Microsoft Azure Cloud
-
Schöck components: Improvement of the requirements processRead more
Together with MaibornWolff, the construction industry specialist optimized the requirements management of its Scalix design software. Thanks to the digital design approach, the technical requirements were re-specified and the software was further developed in a user-centered manner. The aim is to continuously increase user satisfaction and integrate internal and external interests. Read more about the methodology and results now!
Schöck components: Improvement of the requirements processRead moreProject durationsince 2022
Team size2-3 Digital Designer:inside
In 2024Scalix replaces old software -
VW: Digitization of key production figures with the iProcess appRead more
Less paper, more efficiency: Volkswagen replaces analog processes with the iProcess app. Cloud-native technologies and digital design enable intuitive recording and analysis of key production figures. This increases transparency and overall equipment effectiveness and paves the way for predictive maintenance at the automotive group.
VW: Digitization of key production figures with the iProcess appRead moreProject durationSince January 2021
Team size5 to 10 persons
Fast app developmentthanks to Digital Design
-
DER Touristik: Become a digital travel companion in 7 monthsRead more
Travel information, bookings, support - all in one app. With Flutter, MaibornWolff developed a cross-platform solution for DER Touristik. In just seven months, a stable app was created for iOS and Android that supports multiple brands, languages and countries. This is how customer proximity travels.
DER Touristik: Become a digital travel companion in 7 monthsRead more7 monthsFrom Kickoff to Go Live
iOS and AndroidDigital travel companion
Whitelabelling solutionUncomplicated integration of additional brands, languages and countries
-
Mixed reality: driving a real car in a virtual worldRead more
Virtual racing in a real car? MaibornWolff made it possible for the BMW M. Within three months, we used Unreal Engine 4 to develop a prototype that processes vehicle signals with high performance and creates an immersive driving experience without motion sickness. The cockpit remains real, the surroundings become the racetrack.
Mixed reality: driving a real car in a virtual worldRead more<3 monthsFrom the vision to the prototype
3D applicationsin real time
TeamUnreal development, XR technology, game design, smart devices, 3D content
-
KUKA: Web interface for a new Human Machine InterfaceRead more
Rethinking robotics: KUKA is working with us to develop iiQKA.OS - an operating system with an intuitive web HMI. Using web technologies and scrum methods, we enable flexible customization and simple control. Open collaboration makes robotics more accessible than ever before.
KUKA: Web interface for a new Human Machine InterfaceRead moreGoalReplacing the current control software
iiQKA.OSFast and intuitive development
> 11,000 hoursProject work
-
STIHL: Control iMOW robotic mower via appRead more
Robot mower redefined: The iMOW from STIHL makes lawn care smarter. Our software expertise combined with STIHL's hardware know-how ensures intuitive app control. The result? A networked device that makes gardening easier - simple, efficient, innovative.
STIHL: Control iMOW robotic mower via appRead moreProject durationsince August 2020
Robot mowerControl via app
Process optimizationwith the customer
-
DEKRA: Modern enterprise architecture thanks to co-creationRead more
New IT for a sustainable future: the global auditing group needed to modernize its IT landscape. Co-Creation created a harmonized architecture and the EA Community promotes cross-border exchange for strong IT until 2025 - and beyond.
DEKRA: Modern enterprise architecture thanks to co-creationRead moreMost important method:Building an EA community
Created conceptEnterprise Architecture
Cooperationat eye level
-
Miele domestic appliances are networked worldwideRead more
How do household appliances become smart? Miele relies on an IoT platform that we played a key role in developing. Container-based architecture ensures stable communication, DevOps for continuous improvement - so that smart appliances can be found in millions of households worldwide.
Miele domestic appliances are networked worldwideRead moreProject durationsince 2016
Success factors:High availability and scalability
IoT platformwith container-based architecture
-
MAN: Secure Software Development Life CycleRead more
Trucks are networked - and therefore unfortunately also targets for attack. With SSDLC, MAN relies on security by design and integrates the highest security standards directly into development. Together with 22 teams, we have established security measures that go beyond the legal requirements.
MAN: Secure Software Development Life CycleRead more22 monthsProject duration
UNECE R155successfully integratedMethodsSecurity Champions, DevSecOps, OWASP SAMM
-
It's LOS: Building a cloud-based low-code applicationRead more
Democracy meets digitalization: For "Es geht LOS!", we developed a low-code app for candidate management in five weeks. Built on AWS, it enables secure draws and efficient user management - for more citizen participation digitally.
It's LOS: Building a cloud-based low-code applicationRead moreProject durationSince the beginning of 2022
MVPin only 5 weeks
TechnologiesAmplify, AppSync, CodeCommit, IAM, Cognito, DynamoDB, Lambda
-
Monitoring alarms in industrial plantsRead more
Safety in industrial plants requires a real-time overview. We developed a live monitoring platform that networks measuring devices and collects data via Azure IoT and Kubernetes. A scalable MVP was created in just three months: alarms appear in under ten seconds thanks to automated data acquisition via smartphone and Bluetooth.
Monitoring alarms in industrial plantsRead more3 yearsProject duration
<3 monthsto the MVP
Cloud migrationModernization & relocation -
Planning systems: Optimizing the capacity utilization of pressing plantsRead more
Maximum capacity utilization, minimum costs: Our customer relies on a central planning system for pressing plants. We have been supporting its further development with .NET Core, GraphQL and PostgreSQL for over ten years. Now the journey is moving to the cloud - for greater scalability, flexibility and efficiency.
Planning systems: Optimizing the capacity utilization of pressing plantsRead more>10 yearsCustomer support
Technological modernizationCloud-ready platformEfficiency through dataSite-specific cost planning -
Global workforce planning systemRead more
How do you achieve globally harmonized workforce planning? With a modern web application based on domain-driven design and hexagonal architecture. Event sourcing ensures transparent traceability, while Azure and Quarkus provide stability and scalability. The result: a flexible, future-proof solution.
Global workforce planning systemRead moreTeam sizeUp to 8 employees
Domain Driven DesignDevelopment approach
Microsoft Azure Cloudallows easy roll-out of new versions
-
DER Touristik Online: Development and migration of a multi-client capable travel booking platformRead more
Different brands, one platform: DER Touristik merges several independent websites. We are supporting the migration to the AWS cloud with digital design, microservices and testing. The focus is on performance, SEO and UX - for a seamless digital travel experience.
DER Touristik Online: Development and migration of a multi-client capable travel booking platformRead moreStandardized platformMulti-client travel portalQuality assuranceEnd-2-End test automationCloud transformationMigration to AWS cloud -
KUKA: UI/UX design for an app for load data analysis for industrial robotsRead more
How do you reduce support requests? With a smart UX! KUKA and MaibornWolff developed a web-based application for load data analysis. Through "Understand/Build/Learn" we recognized challenges early on and validated solutions for an intuitive user experience.
KUKA: UI/UX design for an app for load data analysis for industrial robotsRead moreMethodProduct Experience Design
Customer requestEasier interaction between users and the system
Our goalOptimized load data analysis, fewer support requests, higher satisfaction -
BMW Group: Replacement of a production-critical legacy systemRead more
20-year-old system, new digital future. We gradually migrated production software to a flexible architecture. After two years, central plants were running on the new solution - stable, fail-safe and ready for the challenges of tomorrow.
BMW Group: Replacement of a production-critical legacy systemRead moreProject durationMid-2018 to the beginning of 2024
Team size25 employees
Legacy systemreplaced after 20 years
-
BMW Group: Virtual reality brings vehicle design to lifeRead more
From the first draft to series production - BMW uses VR to visualize the entire development process. Based on the Unreal Engine, a uniform platform visualizes designs and processes. This saves on hardware prototypes and enables location-independent collaboration. MaibornWolff plays a key role in driving the development and integration of these VR use cases.
BMW Group: Virtual reality brings vehicle design to lifeRead more3.2 yearsProject duration
CooperationLocation-independent and virtual
InfrastructureScalable and expandable thanks to the cloud
-
BMW Group: Remote software upgrade for vehiclesRead more
No visits to the workshop, no stress - thanks to Remote Software Upgrade, BMW vehicles worldwide remain up-to-date "over-the-air". MaibornWolff has been developing and operating the backend for secure updates for over three years. Microservice architectures and DevOps approaches guarantee stability, performance and security.
BMW Group: Remote software upgrade for vehiclesRead more5 yearsProject duration
Millions of vehiclesreceive new features thanks to "over-the-air" upgrade
IT securityAlways up-to-date thanks to remote software upgrade
-
Creditreform: Secure proof of identity on the webRead more
Verifying online identities in a forgery-proof manner while maintaining user-friendliness - CrefoTrust makes it possible. Together, we developed a solution that creates trust with blockchain technology and proofs of concept. Personal and company data remain protected, while verifications run smoothly.
Creditreform: Secure proof of identity on the webRead more5 yearsProject duration
Pilot testsbased on several PoCs
Decentralized identityallows tamper-proof storage of identities and company information
-
Bayernwerk: Knowledge management via teamsRead more
Experience must not be lost - Bayernwerk digitizes the knowledge of long-standing employees. MaibornWolff designed an intuitive MS Teams app with a clear UX/UI. Close collaboration, lived Scrum values and user-centered development make the app a success. Promoting exchange, optimizing processes - this is how knowledge transfer works today.
Bayernwerk: Knowledge management via teamsRead more6 monthsProject duration
Target:Identify implicit knowledge
Requirements:a user-centered, intuitive and clear UX/UI design
-
Weidmüller: Progression of the Industrial Service PlatformRead more
IoT meets agility - Weidmüller and MaibornWolff developed the easyConnect platform for remote access, data visualization and machine learning. After intensive exploration, an MVP was created, accompanied by a cross-functional Scrum team. Making Industrial IoT smarter and more efficient.
Weidmüller: Progression of the Industrial Service PlatformRead more12 monthsup to the MVP
8 weeks analysisof professional, technical and organizational factors
Innovative portalfor end-to-end solutions
-
SMA: Development of a Web UI for ennexOS platformRead more
Optimizing energy flows, reducing costs - we have been developing the Web UI of the ennexOS platform with SMA Solar Technology since 2016. It digitizes energy management processes for over a million users and combines smart solutions for a sustainable energy future.
SMA: Development of a Web UI for ennexOS platformRead moreProject durationsince 2016
> 1.000Modules and components in ennexOS platform
> 7.000Fuse tests
-
digikoo GmbH: Apple Vision Pro for city plannersRead more
Planning cities smarter: Together with TUM, we developed the 3Digipad for Apple Vision Pro. It visualizes complex energy data in 3D and makes scenarios intuitively tangible. Dynamic building data and KPIs support urban planners in making sustainable decisions.
digikoo GmbH: Apple Vision Pro for city plannersRead more4 monthsProject duration
3D map with KPIsDisplay building data dynamicallyEnergy dataImmersive visualization -
digikoo: A data platform for the Azure CloudRead more
Structured geodata, automated quality assurance, seamless provision - we developed a powerful Snowflake data platform on Azure for Digikoo. It makes analysis easier for data scientists and lays the foundation for precise forecasts and new use cases.
digikoo: A data platform for the Azure CloudRead more5 monthsProject duration
Climate changePlan digitally and implement efficiently
Foundation data platformMicrosoft Azure Cloud
Our range of services
We cover the security lifecycle in your organization holistically: from determining the cybersecurity status, to enabling your employees to work securely, to implementing security measures and enabling sustainable and independent operation of your security architecture - also with regard to steps towards digital transformation.
MaibornWolff securesyour entire IT infrastructure with a well-founded risk assessment and targeted defense against threats- today and in the future. We offer IT security consulting at the following levels
We Check: recording the cybersecurity status
We determine your current security status, identify vulnerabilities and assess your risk potential. With our certification preparations for standards such as ISO 27001, UNECE RE 155, NIST SP 800, etc., you can be sure of your compliance.
- Threat Modeling & Risk Assessment
- Security Requirements Engineering
- Security Process, Software and Infrastructure Check-ups
- Certification Readiness Assessments (ISO 27001, UNECE RE 155, NIST SP 800, etc.)
- Penetration Test Scoping & Mitigation
We Enable: empowering people to work safely
Our training courses and workshops enable your teams to identify and minimize security risks. With our know-how, we ensure that your employees act securely and consciously in the following areas:
- Secure Software Development Lifecycles Introduction
- Security awareness and secure development training
- Secure IT Architecture
- CSMS & ISMS Introduction
- BCM Design & Introduction
- Security Strategy Workshops
- Certification Readiness & Audit Preparation (ISO 27001, UNECE RE 155, NIST SP 800, IEC 62344 etc.)
- Security Champions & Companions
- Security Training (Secure Development Training, Security Awareness for Developers, Threat and Risk Analysis, Security Champions)
We Implement: Implementation of security measures
Our top sellers in implementation include Vulnerability Management and IAM Architecture & Implementation. Of course, we can never cover our entire range of expertise in IT security consulting here, we've been in the business too long for that. It is therefore best to contact us personally and together we will find the service modules that your company needs in order to operate in the best possible way.
This is how an IT security consultation works with us
From the initial analysis and training of your employees to the implementation and operation of advanced security systems - we ensure that your IT security is not just a wish list, but a reality. Our cooperation works as follows:
Step 1:
It all starts with a joint discussion in which goals and expectations are defined
Step 2:
We then determine the current cybersecurity status and carry out a risk and threat analysis and, if necessary, a security audit.
Step 3:
Together with you, we evaluate and prioritize the measures resulting from the analysis.
Then, depending on the company, we continue with the specific implementation of security measures or the empowerment of your employees to work securely in the form of training courses and workshops.
We are experts at finding gaps and potentials in your IT security - all you have to do is give us access to the relevant information and code bases. This means that we work closely together as equals in the field of IT security consulting. To do this, we need your commitment that you can also support this collaboration in the form of meetings and employee resources. We take care of the rest.

Ready for comprehensive IT security advice?
Whether you want to define strategic security goals, navigate compliance risks or achieve technical excellence - MaibornWolff's IT security consulting provides you with tailor-made solutions for your requirements. Because we build the bridge from pure governance and compliance to predictable and, above all, implementable cybersecurity when you contact us.
FAQs
What does IT security consulting typically involve?
IT security consulting includes an inventory of the current security landscape, the identification of vulnerabilities, a risk assessment, the recommendation and implementation of security measures, support with compliance and certifications as well as various training courses and awareness-raising sessions for employees.
What role does safety training play in a comprehensive safety strategy?
Security training is essential to raise employees' awareness and understanding of cybersecurity and to enable them to comply with security regulations in day-to-day operations.
How often should an organization conduct an IT security assessment?
The frequency of security assessments can vary, but should be carried out regularly - at least once a year or when significant changes occur in the IT environment - to identify new risks and threats.
How can a company ensure that IT security measures are followed within the development teams?
It is crucial to embed security awareness and practices into the corporate culture. This can be achieved through regular training, the integration of security into the software development lifecycle and the appointment of security champions in the teams. In addition, compliance with security policies should be ensured through ongoing monitoring and audits.
What are security champions and how can they be used in an organization?
Security Champions are employees who are trained in security practices and act as security liaisons within their teams to promote best practices and serve as a bridge to the IT security department.