ECOS Technology - IT security made in Germany
we connect IT | we protect IT we connect IT stands for solutions that provide employees of public authorities, institutions and companies with highly secure access to central data and applications while on the move or from home.
we protect IT stands for securing communication in the field of IT, IoT and Industry 4.0.
Securely yours
The right access solution for any requirement
The ECOS SECURE BOOT STICK® allows mobile working using any any PC or Mac in an easy and highly secure way.
Access data and applications in your organization or government agency with BSI approval for processing documents up to classification level VS-NfD, EU and NATO RESTRICTED - even from your private PC.

The ECOS TRUST MANAGEMENT APPLIANCE is a PKI and key management solution for securing PCs, servers, processes, (I)IoT and mobile devices.
PKI and key management out-of-the-box
Seamless integration into the existing infrastructure
Fully scalable and optionally high availability
Supports all platforms
Application scenarios for ECOS products and solutions

Home office (BYOD)

Connecting external staff

Connecting reservists

VS-NfD on standard PC
More application scenarios
and the right ECOS solution can be found in our Product Finder.

Turning PCs into thin clients

2-factor Authentication

Cross-platform PKI

Securing IoT +IIoT
Looking for a fancy job?
Take a look at our job vacancies or send us directly your speculative application!
News
Remote access with hardware encryption
The new ECOS SECURE BOOT STICK [HE] provides highly secure access from home or on the road ...
The new ECOS SECURE BOOT STICK [HE] provides highly secure access from home or on the road ...
Remote access for VS-NfD:
BSI renew approval for the ECOS SECURE BOOT STICK
A further development of the ECOS SECURE BOOT STICK product family is…
BSI renew approval for the ECOS SECURE BOOT STICK
A further development of the ECOS SECURE BOOT STICK product family is…
Hospitals targeted by ransomware attacks
Cyber attacks on hospitals have made headlines for some time now. These cryptoviral attacks are very often launched…
Cyber attacks on hospitals have made headlines for some time now. These cryptoviral attacks are very often launched…
A "right to home office": How companies should prepare for it
The "right to home office" is once again the subject of heated debates. Under the leadership of Minister Hubertus Heil,…
The "right to home office" is once again the subject of heated debates. Under the leadership of Minister Hubertus Heil,…
Mastering the challenges of BYOD
The massive spread of mobile devices has led to a new phenomenon for IT managers and administrators alike with advantages and disadvantages. BYOD (Bring Your Own Device) refers to users who use their private devices for business purposes. It naturally puts special demands on security when these devices are integrated into a company network. In BYOD scenarios, ECOS Technology products provide a significant increase in data protection by separating private hardware and business use one hundred percent while also meeting the respective compliance requirements.
IoT: More than just notebooks and PCs
The times when networking and online connectivity were only relevant for classic computers and PCs are long gone. In many areas, the keyword IoT is now a matter of securely integrating a wide variety of machines and devices into the network, be it complex systems in production or the IT of vehicles. Key management literally plays a key role in IoT, because appropriate certificates and keys must to ensure that only authorized systems or devices can access network resources. Efficient key management is therefore an indispensable part of a holistic IoT strategy.
IoT in the industrial environment
While in the private sector IoT concepts are often still smiled at or viewed with a certain suspicion (e.g. the refrigerator ordering food on its own via Internet), the industry is already a large step ahead. The use of the Industrial Internet of Things, abbreviated IIoT, is often at the core when it comes to optimizing important business processes. Security in the IIoT environment can be increased by using a digital certificate that allows to verify the authenticity of the respective device.
Fit for the Internet of things with ECOS
A PKI solution can form the cornerstone for a secure use of the Internet of Things in many infrastructures. The public key infrastructure thereby acts, so to speak, as a control center that is responsible for issuing and validating certificates. Symmetric keys can be used especially in this contect. The PKI solution from ECOS provides a simple and clear administration of symmetric keys