CERTIX IT-Security GmbH

How save are the in your Company?

Do you still believe or do you already know?

"If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology."
Bruce Schneier

Become the knowing.

The CERTIX IT Security GmbH is an innovative IT security service provider. Since we are working completely independent of manufacturers, we provice consultation and analysis with our only focus on IT security. Our objective view allows us to help you taking the right decisions.

The CERTIX team is a group of administrators and IT security experts with very different backgrounds. This heterogeneity promotes inventiveness which forms the main basis of our work. Especially at penetration testing the final result depends a lot on the skills and creativity of the tester.

For this reason we invest much energy in the realization of our own projects, such a developing testing frameworks. This increases the knowledge within the team and makes our work more efficient.

Benefit from our experience and motivation and contact us.

Penetration Test

A penetration test is a controlled intrusion of IT infrastructure. The acting from the perspective of an attacker allows a realistic evaluation regarding the effectiveness of your IT security. Based on penetration tests further activities can be taken to enhance the protection of your business. The security of a company can often be improved with relatively little effort. Nevertheless, many companies are vulnerable to even simple attacks. Let us help you! Our security analysis will enable you to develop effective strategies for protecting your IT infrastructure.

IT Forensik

After a successful attack, the magnitude of the resulted damage is often difficult to estimate. Professional attackers deploy methods to conceal their activities. The reconstruction of the development of unauthorized manipulation is a major component of IT forensics. Important insights can be gained from this course for future action. Especially the determination of the exploited vulnerability is important to prevent a re-utilization.

Managed Security

So-called net-based Intrusion Detection Systems (IDS) are used by many companies to discover attacks on their networks by using pattern recognition. Because many different factors must be taken into consideration, an evaluation of output can not be done by machine. Due to our daily work with IT security, it is possible for us to assess situations very well. This allows early detection and prevention of attacks to fend off the threatening damage.

Surveillance Agent (m/f)

  • Technical skills:
    • completed vocational training
    • good knowledge of Windows operating systems
    • excellent knowledge of network protocols
    • knowledge in Linux / networks / programing preferable
  • General requirements:
    • confident appearance
    • readiness of mind and the ability to reason
    • absolute reliability and an accurate way of working
    • particularly distinctive motivation
    • independent working
  • We offer:
    • alternating fields of work
    • project-related work
    • pleasant work environment
    • very interesting work perspectives
  • Tasks:
    • planning, installing and maintaining IT systems
    • supporting IT security related projects
    • monitoring IT Environments

IT Security Expert (m/f)

  • Technical skills:
    • degree in information technology or electrical engineering preferable
    • excellent knowledge of operating systems and networks
    • experience in several programing languages
    • broad range of other IT related know-how
    • open for "leading edge" technologies
  • General requirements:
    • confident and competent appearance
    • readiness of mind and the ability to reason
    • absolute reliability and an accurate way of working
    • particularly distinctive motivation
  • We offer:
    • alternating fields of work
    • realization of own projects
    • project-related work
    • pleasant work environment
  • Tasks:
    • creating IT security concepts
    • executing penetration tests
    • implementing new ideas regarding IT security


CERTIX IT-Security GmbH
Walter-Gropius-Str. 10
50126 Bergheim

Phone: +49 (0)2271 498247
Fax: +49 (0)2271 678016
Mail: info@certix.de

Liability for Contents

As service providers, we are liable for own contents of these websites according to Sec. 7, paragraph 1 German Telemedia Act (TMG). However, according to Sec. 8 to 10 German Telemedia Act (TMG), service providers are not obligated to permanently monitor submitted or stored information or to search for evidences that indicate illegal activities.

Legal obligations to removing information or to blocking the use of information remain unchallenged. In this case, liability is only possible at the time of knowledge about a specific violation of law. Illegal contents will be removed immediately at the time we get knowledge of them.

Liability for Links

Our offer includes links to external third party websites. We have no influence on the contents of those websites, therefore we cannot guarantee for those contents. Providers or administrators of linked websites are always responsible for their own contents.

The linked websites had been checked for possible violations of law at the time of the establishment of the link. Illegal contents were not detected at the time of the linking. A permanent monitoring of the contents of linked websites cannot be imposed without reasonable indications that there has been a violation of law. Illegal links will be removed immediately at the time we get knowledge of them.


Contents and compilations published on these websites by the providers are subject to German copyright laws. Reproduction, editing, distribution as well as the use of any kind outside the scope of the copyright law require a written permission of the author or originator. Downloads and copies of these websites are permitted for private use only.
The commercial use of our contents without permission of the originator is prohibited.

Copyright laws of third parties are respected as long as the contents on these websites do not originate from the provider. Contributions of third parties on this site are indicated as such. However, if you notice any violations of copyright law, please inform us. Such contents will be removed immediately.

Privacy Policy

1. An overview of data protection


The following gives a simple overview of what happens to your personal information when you visit our website. Personal information is any data with which you could be personally identified. Detailed information on the subject of data protection can be found in our privacy policy found below.

Data collection on our website

Who is responsible for the data collection on this website?

The data collected on this website are processed by the website operator. The operator's contact details can be found in the website's required legal notice.

How do we collect your data?

Some data are collected when you provide it to us. This could, for example, be data you enter on a contact form.

Other data are collected automatically by our IT systems when you visit the website. These data are primarily technical data such as the browser and operating system you are using or when you accessed the page. These data are collected automatically as soon as you enter our website.

What do we use your data for?

Part of the data is collected to ensure the proper functioning of the website. Other data can be used to analyze how visitors use the site.

What rights do you have regarding your data?

You always have the right to request information about your stored data, its origin, its recipients, and the purpose of its collection at no charge. You also have the right to request that it be corrected, blocked, or deleted. You can contact us at any time using the address given in the legal notice if you have further questions about the issue of privacy and data protection. You may also, of course, file a complaint with the competent regulatory authorities.

Analytics and third-party tools

When visiting our website, statistical analyses may be made of your surfing behavior. This happens primarily using cookies and analytics. The analysis of your surfing behavior is usually anonymous, i.e. we will not be able to identify you from this data. You can object to this analysis or prevent it by not using certain tools. Detailed information can be found in the following privacy policy.

You can object to this analysis. We will inform you below about how to exercise your options in this regard.

2. General information and mandatory information

Data protection

The operators of this website take the protection of your personal data very seriously. We treat your personal data as confidential and in accordance with the statutory data protection regulations and this privacy policy.

If you use this website, various pieces of personal data will be collected. Personal information is any data with which you could be personally identified. This privacy policy explains what information we collect and what we use it for. It also explains how and for what purpose this happens.

Please note that data transmitted via the internet (e.g. via email communication) may be subject to security breaches. Complete protection of your data from third-party access is not possible.

Notice concerning the party responsible for this website

The party responsible for processing data on this website is:

CERTIX IT-Security GmbH
Frank Schneider
Walter-Gropius-Straße 10
50126 Bergheim

Telephone: 02271-498247
Email: info@certix.de

The responsible party is the natural or legal person who alone or jointly with others decides on the purposes and means of processing personal data (names, email addresses, etc.).

Revocation of your consent to the processing of your data

Many data processing operations are only possible with your express consent. You may revoke your consent at any time with future effect. An informal email making this request is sufficient. The data processed before we receive your request may still be legally processed.

Right to file complaints with regulatory authorities

If there has been a breach of data protection legislation, the person affected may file a complaint with the competent regulatory authorities. The competent regulatory authority for matters related to data protection legislation is the data protection officer of the German state in which our company is headquartered. A list of data protection officers and their contact details can be found at the following link: https://www.bfdi.bund.de/DE/Infothek/Anschriften_Links/anschriften_links-node.html.

SSL or TLS encryption

This site uses SSL or TLS encryption for security reasons and for the protection of the transmission of confidential content, such as the inquiries you send to us as the site operator. You can recognize an encrypted connection in your browser's address line when it changes from "http://" to "https://" and the lock icon is displayed in your browser's address bar.

If SSL or TLS encryption is activated, the data you transfer to us cannot be read by third parties.

3. Data collection on our website


Some of our web pages use cookies. Cookies do not harm your computer and do not contain any viruses. Cookies help make our website more user-friendly, efficient, and secure. Cookies are small text files that are stored on your computer and saved by your browser.

Most of the cookies we use are so-called "session cookies." They are automatically deleted after your visit. Other cookies remain in your device's memory until you delete them. These cookies make it possible to recognize your browser when you next visit the site.

You can configure your browser to inform you about the use of cookies so that you can decide on a case-by-case basis whether to accept or reject a cookie. Alternatively, your browser can be configured to automatically accept cookies under certain conditions or to always reject them, or to automatically delete cookies when closing your browser. Disabling cookies may limit the functionality of this website.

Cookies which are necessary to allow electronic communications or to provide certain functions you wish to use (such as the shopping cart) are stored pursuant to Art. 6 paragraph 1, letter f of DSGVO. The website operator has a legitimate interest in the storage of cookies to ensure an optimized service provided free of technical errors. If other cookies (such as those used to analyze your surfing behavior) are also stored, they will be treated separately in this privacy policy.

Server log files

The website provider automatically collects and stores information that your browser automatically transmits to us in "server log files". These are:

  • Browser type and browser version
  • Operating system used
  • Referrer URL
  • Host name of the accessing computer
  • Time of the server request
  • IP address

These data will not be combined with data from other sources.

The basis for data processing is Art. 6 (1) (f) DSGVO, which allows the processing of data to fulfill a contract or for measures preliminary to a contract.

4. Plugins and tools

Google Maps

This site uses the Google Maps map service via an API. It is operated by Google Inc., 1600 Amphitheatre Parkway, Mountain View, CA 94043, USA.

To use Google Maps, it is necessary to save your IP address. This information is generally transmitted to a Google server in the USA and stored there. The provider of this site has no influence on this data transfer.

The use of Google Maps is in the interest of making our website appealing and to facilitate the location of places specified by us on the website. This constitutes a justified interest pursuant to Art. 6 (1) (f) DSGVO.

Further information about handling user data, can be found in the data protection declaration of Google at https://www.google.de/intl/de/policies/privacy/.

Site Notice

CERTIX IT-Security GmbH
Walter-Gropius-Str. 10
50126 Bergheim

Tel: +49 (0)2271 498247
Fax: +49 (0)2271 678016

E-Mail: info@certix.de

CEO: Frank Schneider (FS)
PGP-Fingerprint: 8D1C 42B4 C4C4 573A A2C0 B915 19A8 7562 9B5F 52E5

USt-Id-Nr. DE259874887
Steuer-Nr. 203/5731/0753

Handelsregister Köln,
HRB-Nr.: 62772
Head Office: Bergheim

The company name CERTIX is a registered trademark and the logo is a registered picture trademark,
registered at the German Patent and Trademark Office (register number 302010051295).

Responsible with regards to content appropriate § 10 paragraph 3 MDStV: Frank Schneider

Image sources:
Runder 10 Jahre Garantie Stempel © a2-design - Fotolia.de
CSCG-Logo - B.Sc. David Bothe - internet-sicherheit.de

General Terms and Conditions

General Terms and Conditions (PDF)