Embedded Systems: Customised Embedded Solutions and Embedded Development
Revolution at the Edge and Beyond
Embedded systems are an integral part of Industry 4.0. Modern embedded solutions play a decisive role in mastering the complex requirements that data-driven processes, advanced wireless connectivity and edge computing in cloud architectures entail.
They are at the heart of innovative technologies and make cyber-physical systems or smart embedded systems possible in the first place. Our expertise in the development and optimisation of such systems ensures that your solutions are future-proof, efficient and powerful.
Our team of experts in embedded software, firmware and RTOS will support you every step of the way - from the initial idea to development and series production. We ensure seamless integration, high security standards and optimum utilisation of your resources.
Discover how our solutions can turn your visions into reality.

Technical Complexity and Edge Computing
The technical integration of modern systems is becoming increasingly complex. With the growing spread of edge computing, applications can be executed directly at the edge with the help of edge AI and embedded machine learning instead of being dependent on central data centres. This saves time, reduces latency and enables real-time responses. Our offer: Have your solution checked by our experts. We analyse whether your function would be better implemented on the edge or in the cloud. With our expertise, we will find the optimal approach for your application.

Regulations and Security Requirements
Compliance with security standards and regulatory requirements such as NIS2 and CRA is crucial to protect modern embedded systems. The Cyber Resilience Act (CRA) focuses on improving the security of hardware and software products in the EU, while the NIS2 Directive strengthens cybersecurity requirements for essential and important entities to enhance overall resilience against cyber threats. Embedded security, embedded cyber security and cyber security play a central role in ensuring data integrity and system security. Our security solutions provide you with a strong foundation to minimise risks and comply with strict regulations.

Flexible Hardware Requirements and Scalability
Embedded systems must be flexible and adapt to the specific requirements of your application. From small 8-bit microcontrollers and bare-metal systems to highly scalable embedded Linux gateways. Our systems are not only powerful, but also future-proof and easily scalable to keep pace with growing requirements. We place particular emphasis on efficiency, reliability and smooth integration into existing systems.
Connectivity and Communication
Modern IoT devices and gateways require excellent connectivity. We rely on proven technologies such as Wi-Fi, Bluetooth, Zigbee and mobile networks to ensure smooth communication. This allows data to be transmitted securely and efficiently.

Edge Intelligence for Immediate Decisions
By processing data locally and using machine learning with embedded AI, systems can react in real time. Predictive maintenance, real-time monitoring and fast decision-making are just some of the benefits of this technology.

Optimised Energy and Resource Management
Efficient energy and resource management is the key to long-lasting and resource-saving embedded systems. With our intelligent energy management solutions, you can maximise the operating time of your devices and minimise energy consumption.

Built-in Security Mechanisms
Integrated security features such as encryption, authentication and regular security updates ensure maximum data integrity and protection against cyber attacks.

User-friendly Interfaces
Our intuitive user interfaces make it easy to control and configure your systems. In this way, we ensure that end users can also work with your solutions without any problems.


Customer
Wilhelm Rutenbeck GmbH & Co. K
(manufacturer of communication technology products)
Use Case
Goal: Simplification of home automation through user-friendly control of IP-based switch actuators and sensors for everyday devices.
Solution approach: Development of a cross-platform mobile app with Flutter and a cloud backend for the intuitive handling of switching centres, including over-the-air firmware updates.
Business Case
Improving the user experience through a convenient and centralised app control that increases ease of use in the field of home automation.
Tech Stack
Flutter, NestJS (TypeScript), Azure Cloud, Firebase, Azure IoT Hub, Docker, Kubernetes

Customer
Melitta Single Portions
(household appliance manufacturer)
Use Case
Goal: Networking the Avoury One® tea machine. Collection of user data and appliance data for analytics and appliance management - from production to the end of life
Solution approach: Global IoT platform and services based on it. Development of the overall solution - initial focus: device lifecycle management with ‘over the air updates’
Business Case
Digital services for manufacturers, end users and third parties - focus on customer loyalty & data utilisation
Tech Stack
Azure IoT Hub, Device Management, Nordic SoftDevice + BLE, C, C++, iOS native app development
That’s why our clients work with conplement AG
Vorwerk also relies on external partners for the development of its products. It cannot be emphasised often enough how important it is to establish a continuous process characterised by trust. Together with conplement AG, we have achieved exactly that.

It is invaluable to have a partner like conplement AG at our side who can draw on a wealth of experience from a large number of IoT projects with smart, networked devices.

Free White Paper ‘Remote Updates for Embedded Linux Systems’
Get your Free E-Paper now: Build, Buy or Buy & Integrate Approach for your Operating System
Innovation through Safety and Quality: our Approach for long-term Success
Our security standards, anchored in the SSDLC (Secure Software Development Life Cycle), and the comprehensive automation of tests, deployment and bug fixing form the cornerstones of our strategy for ensuring consistently high software quality and increasing efficiency in recurring processes. This sets us apart from other providers in the IT sector in the long term and creates competitive advantages. The quality of software is a decisive factor for your success.
ISO 25010, for example, defines software quality through a comprehensive range of quality characteristics that encompass both functional and non-functional aspects and emphasises that quality goes beyond the mere absence of errors.
This standard provides the guideline ‘Software Product Requirements and Evaluation (SQuaRE)’, which offers detailed guidelines for the evaluation and requirements of software products and their development. It emphasises not only correct functionality, but also a variety of other criteria such as usability, efficiency, reliability, security and maintainability as decisive factors for the quality of a software product and is continuously incorporated by our project managers, developers and software architects as a benchmark for sustainable software development in the interests of our customers.
Our commitment to security is reflected in the following measures:
- The implementation of Security by Design / Privacy by Design using our SSDLC@cp, based on the guidelines of the Open Web Application Security Project / Software Assurance Maturity Model (OWASP SAMM).
- Regular security counselling tailored to individual roles.
- Continuous mentoring on security issues throughout the entire development cycle.
- Use of the Security Canvas to systematically identify all security-relevant aspects and derive appropriate measures.
- Ongoing checks for vulnerabilities and the swift elimination of these to ensure maximum security.
You can rely on us

All-round carefree
We support and accompany you as a strong partner throughout the entire software life cycle.

Minimised risk
Reduce security risks with our device lifecycle solutions and secure software development lifecycle.

Trust through experience
With conplement AG, you have a partner at your side who can look back on around 20 years of experience in a wide range of industries.

Time for your core business
We take the pressure off you and your team. So you can focus on your core business.
Security Creates Trust: cp is Certified
To make our quality standards transparent for you, we at conplement AG rely on certifications. We are currently certified in accordance with DIN EN ISO/IEC 27001:2017 and ISO 9001. DIN EN ISO/IEC 27001:2017 is an international standard for information security management systems (ISMS), ensuring the protection of data and risk management, while ISO 9001 is a quality management standard that focuses on improving processes to enhance customer satisfaction and efficiency.

Certified quality management
conplement AG is certified according to DIN EN ISO 9001
Our QM system ISO 9001 certification proves that we are able to provide products that meet the requirements of our customers and fulfil all official requirements. We are also constantly endeavouring to increase customer satisfaction.

Certified information security management system
conplement AG is certified according to DIN EN ISO/IEC 27001:2017
conplement AG has demonstrated a high level of information security through independent external audits. Certification in accordance with DIN EN ISO/IEC 27001:2017 confirms the current status and very high quality of the implemented information security management system (ISMS). The certification shows that conplement AG attaches great importance to information security and the effective protection of sensitive data and information.

Cyber Security Alliance
conplement AG is a member of the Cyber Security Alliance
Cybercrime is a major threat to almost every company in the world. Only by taking active countermeasures can we protect ourselves and our customers from data loss, financial damage and reputational damage. Effective protection against attacks strengthens the trust of our customers, promotes business growth and ensures long-term success in an increasingly networked world. The Cyber Security Alliance offers us a network to exchange ideas with other IT companies in this field.