Edgar Kramer

Sales Community Lead Benelux

Technology innovations in IoT are here to stay. Connected devices throughout industries enable disruptive business models that deliver value throughout the product life cycle. The term ‘customer experience’ will take on completely new meaning, since it is crucial to create customer stickiness and learn as much as possible from users in order to continuously deliver the highest possible value over time.

As device connectivity is coming to people’s homes, cars, elevators, healthcare products and other sensitive parts of our lives, it is clear that ensuring customer security and privacy is a must. In order to gain customer trust and loyalty, investing in transparency and security is a winning strategy and enables significant differentiation when compared to competitors.

Nixu’s security engineering and secure R&D teams have decades of experience in IoT and connected, embedded devices. Our customers come from a variety of industries, with different business models, technologies and platforms. We enable your innovation by ensuring your success when it comes to securing your intellectual property, your customer data ecosystems and your privacy.

In order to succeed in our mission, we constantly employ the best professionals on the market and provide an environment with new professional challenges to ensure that our team of more than 300 people remains the best and our services are of the highest quality in Europe. Our customers have won prizes in IoT security, which enables us to keep up the good work and support our customers in their innovations.


Secure Software Development

We improve software development methods by introducing new security-enhancing elements in existing development methods, such as Scrum. These elements can be tailored to customer needs. Some of the elements we have introduced in the past include threat workshops, exploratory reviews and developer coaching in secure practices. We provide internal support and guidance for the development team, sparring with the team to ensure a secure software delivery.

Provided as a continuous service, secure software development not only steers the developers in a single project’s information security issues, but also helps improve their architectural solutions and software development processes. Individual projects can be supported by assessing the maturity of the developer team’s security solutions and practices. These assessments provide observations that are relevant also to the organisation's other development projects.

Penetration testing

Have you ever wondered how easy it would be to compromise your systems? Our skilled penetration testers will examine your products or IT infrastructure like a cybercriminal would – looking for a weak spot through your defenses. In penetration tests, we focus on exploitability: can the vulnerabilities be used for leaking information, lateral movement, or remote code execution? Our penetration testing approach combines state-of-the-art testing tools, examining source code, and our professionals' white-hat hacking experience. You will get:

  • Expert analysis of the discovered and verified vulnerabilities, together with exploitability information and a criticality estimate. All our security reports are delivered and explained to you by real people — not robots.
  • Mitigation instructions.
  • Improvement recommendations to prevent similar vulnerabilities in the future.

We scale the penetration testing assignment based on your needs and the risk level of the system. We can help you verify the quality of your product before release, target all your company IT, or simulate an attack against a power plant. Contact us for more information.

Secure Device Management

What if you could have secure IoT devices and manage them like your company workstations and user accounts, securely? Centralized management, security updates, centralized access management, and incident notifications - all of these features are now possible for IoT with Our Secure Device Management service. You'll gain a competitive edge in the market, where cybersecurity-related regulation and standards are emerging on all continents. The security of new products is increasingly expected to be verified. Consumers are also looking for secure, reliable, and privacy-friendly products and are willing to pay more for those features. 

Our Secure Device Management is a turnkey solution that allows you to have a secured and securely managed IoT device fleet. With Nixu Secure Device Management, you get the benefit of:

  • 0-touch provisioning
  • Granular device management and over-the-air updates
  • Vulnerability management 
  • Public Key Infrastructure (PKI)
  • Identity and access management
  • Security monitoring
  • Secure device platform, backed by device hardware

With our Secure Device Management, you'll have your IoT devices secured throughout their entire lifecycle with conformance to relevant cybersecurity standards, optimized investment, and faster time to market, while enabling you to shift your efforts to application development. Our solution is cloud-independent and requires minimal customization. Contact us for more information.


In the modern world, security plays a crucial part in overall product quality. We help you to embed cybersecurity into your DevOps by applying security controls, practices, and security testing technology. We support your journey in incorporating security to DevOps sprints and to your CI/CD pipelines. We will also enable visibility into your product security quality by creating security coverage dashboards that visualize the security state of your product. www.nixu.com/devsecops

IoT Cybersecurity Roadmap

Internet-facing devices and IoT ecosystems are easy targets for automated attacks. Still, IoT devices are something that end-users don't remember to patch - they expect them to be secure and privacy-friendly, and are willing to pay more for those features. In addition to the increased end-user awareness, there's pressure to conform to cybersecurity standards. In healthcare, industrial automation, and other regulated fields, verified security and certification are the only way into the market.

Our IoT Cybersecurity Roadmap gets you on the right track of building IoT products and services with security and privacy beyond compare. Our professionals in IoT and embedded security, software development security, and cloud security examine your product architecture, development lifecycle, and cloud architecture to provide actionable recommendations. Our roadmap allows you to:

  • Learn your IoT ecosystem's security strengths and weaknesses compared with the market expectations and threats associated with the digital world.
  • Compare your conformance to security best practices and applicable standards and regulations.
  • Get a development program with actionable steps to secure your entire ecosystem, aligned with your business objectives.
  • Achieve a sustainable security level with optimized investments.
  • Build trust among your customers and users.

Let your IoT products differentiate with cybersecurity. Contact us for more information.

Secure R&D Support

Applying security as part of your design and product development enables your products to avoid and withstand security breaches. Our goal is to tailor a security framework within your existing product development process that meets your industry’s standards. We utilize known methodologies such as BSIMM, SAMM, or Microsoft SDL, which include a variety of security controls and activities such as threat modeling, business impact assessments, code reviews, and more.

  • Quick guide on how to make IoT a security enabler
  • Edgar Kramer

    Sales Community Lead Benelux

Related blogs