IT center

Information Security


Information Security is an Integral Part of Our Corporate Culture

Based on the external and internal requirements but above all, in line with the security requirements of our customers, information security must be an integral part of our corporate culture.

The information security strategy of Rosenberger Hochfrequenztechnik GmbH & Co. KG is the framework according to which the information security guidelines of Rosenberger Hochfrequenztechnik GmbH & Co. KG are created. The information security strategy relates to information of all forms and has the particular objective of protecting the following information properties.

  • Confidentiality
  • Availability
  • Integrity

With this information security strategy the management and the Rosenberger Management Board underline the relevance and critical importance of information security and data protection within the company.



Rosenberger was audited at TISAX®
The ENX Association supports with TISAX® (Trusted Information Security Assessment Exchange) on behalf of VDA the common acceptance of Information Security Assessments in the automotive industry and allows recognition of assessment results among the participants. The TISAX® Assessments are conducted by audit providers that demonstrate the qualification at regular intervals.

If you want to process sensitive information from customers or evaluate the information security of suppliers, TISAX® supports you in reducing efforts.
Rosenberger participant ID: PVYT81

Register or Sign in


Rosenberger BugBounty Programm

Information security has a high priority at Rosenberger: We are following international standards regarding information security, but we know that no application or technology is perfect. That is why the Rosenberger Group has set up a BugBounty program.

The term "Bug Bounty" describes the process of awarding the disclosure of errors in applications. Independent security experts from all over the world can help to make our systems even more secure by researching security issues and privately passing on the results to us. This gives us the opportunity to fix security vulnerabilities and to prevent exploitation.

The Rosenberger Group uses the BugBounty platform Intigriti ( Intigriti supports us in systematically identifying and evaluating security issues in order to eliminate them.

If you're interested in participating in our Rosenberger BugBounty program, you can tell us your Intigriti username via the email address Useful information regarding rules, scope and bounties are stated in our Intigriti profile.

We are asking you to not use large-scale security scanners, scrapes or automated tools which will create excessive traffic on our web applications.

Happy hacking!