Product, IT, and OT Security - Comprehensive Security Consulting

IT, Product, and OT Security from a Single Source

Security Assessments & Gap Analyses

Strategy Development & Security Roadmaps

IT/OT Convergence & Industrial Security (IEC 62443)

vCISO Engagements & Project Support

Safety isn't a department. It's a mindset.

Attackers don’t distinguish between IT, products, and operational systems—they exploit the weakest link. That’s why we don’t operate in silos; instead, we integrate IT security, product security, and OT security into a cohesive strategy that leaves no gaps.

From assessing the current situation to implementing measures

We guide you through the entire process. Security assessments and gap analyses show where your company stands. Based on these findings, we develop a security roadmap with prioritized measures—tailored to your business risks, not to technical wish lists.

Whether it’s IT/OT convergence, industrial security in accordance with IEC 62443, the EU Machinery Directive, or a vCISO mandate for long-term project support—we deliver solutions that your teams can actually implement.

Vendor-neutral. Easy to understand. Experienced.

We operate independently of any manufacturer’s interests, avoid technical jargon, and bring over 30 years of experience in Switzerland to the table. Regulatory requirements such as NIS2, ISO 27001, IEC 62443, or the Cyber Resilience Act are not obstacles, but rather the framework within which we provide you with clarity.

Security as a Competitive Advantage

Companies that make cybersecurity a strategic priority not only fulfill their duty of care—they also build trust with customers, partners, and regulators. We help you clearly define responsibilities and foster a security culture that is embraced throughout the entire organization.

Security isn't achieved through a one-time project, but through continuous improvement. We are the partner who will support you in this endeavor over the long term.

Our Other Services & Solutions

IT/OT Risk Analysis at the Board of Directors Level

Managing cyber risks at the board level

  • Initial assessment in accordance with ISO 27005
  • Semi-annual reassessment
  • VR-compatible reports in business language
  • Compliance: OR 716a, nDSG, FINMA
Learn more

Passwordless Federated SSO & PKI Automation – Soliton

Zero-Trust Identity

  • Passwordless Authentication
  • Federated SSO (SAML / OIDC)
  • Automated Certificate Lifecycle Management
  • Zero-Trust Architecture & Integration
Learn more

Identify attack vectors before attackers exploit them – XM Cyber

Continuous Exposure Management

  • Continuous attack simulation
  • Attack Path Management
  • Prioritized recommendations for action
  • Integration with existing security tools
Learn more

Stefan Hungerbühler

CEO of SecureComply GmbH

Expertise on an equal footing
Do you have any questions?

In today’s ever-changing threat landscape, taking a proactive approach is crucial. We’ll show you how to use Continuous Exposure Management and Attack Path Management to close security gaps before they can be exploited, and how to seamlessly integrate these solutions into your existing infrastructure.

Stefan Hungerbühler

CEO of SecureComply GmbH

SecureComply GmbH

‍Islerenweg 5a
8708 Männedorf

info@securecomply.ch
+41 79 746 35 88

© SecureComply, LLC