Software Development by CREA plus

The experts at CREA plus have a long term experience and deep expertise in the development of software in the security-critical field. We consistently develop software with "Security by Design" principle. We transform your ideas into real and executable applications.

Our customers benefit from professional implementation by an experienced team of developers. CREA plus also employs proven experts in the field of  IT security and cryptography. We consistently apply IT security standards and guarantee high quality. We have already successfully implemented a large number of software development projects.

Benefits of a software development by CREA plus:

  • Experts with project experience and knowledge of IT security and cryptography
  • Agile development process with transparent results in each project phase
    • State-of-the-art development process 
    • Use of Jira as project and task management tool, 
  • Fast and flexible support in the event of resource bottlenecks 
  • Applying IT security standards
  • Project management using secure communication channels etc.

Please contact us by sending an email to This email address is being protected from spambots. You need JavaScript enabled to view it. to find out more details about the software development by CREA plus.

News

Priviledge Escalation Vulnerability

utimaco LAN V5 3Utimaco has been made aware of a vulnerability affecting the Windows installations of some of our products.

Read more ...

Utimaco on RISK Conference 2020

Utimaco presentation RISK 2020Utimaco is going to attend the RISK conference 2020 with a presentation "Trust the NEXT Digital Era".

Read more ...

CREAplus Successfully Delivered Training for Utimaco HSM

utimaco LAN V5 4CREAplus, authorized Utimaco training partner, successfully delivered another Utimaco Academy 2-day online hands-on technical training on Utimaco hardware security module (HSM), in November 2020.

Read more ...

Blog: NIST’s Standardisation of PQC

graph data breachesBlog post: The World of Quantum Computing - NIST’s Standardisation of PQCCybersecurity 

Blog: Zerologon Vulnerability

graph data breachesBlog post: Cybersecurity - Zerologon Vulnerability