Certification
Alexa Auto Testing
Alexa Built-in experiences provide convenient voice-initiated interactions for Alexa and Alexa Auto users. In addition to user experience, Amazon also takes the security seriously of devices integrated with Alexa, such as smart speakers, voice accessories, and automotive devices. Therefore, all device manufacturers are required to pass the cybersecurity testing with the authorized 3rd party lab to ensure that Alexa Built-in devices comply with the requirements of Alexa and Alexa Auto. The Amazon Alexa product verification process can only be completed after security requirements are met.
CTIA for 5G Cybersecurity
The popularity of 5G accelerating IoT applications, which has become a big wave of technology, as well as has driven strong demands for cybersecurity testing of connected devices.
Crest Penetration Testing and Vulnerability Assessment
Crest penetration testing and vulnerability assessment service can help clients identify potential internal and external security issues. Not only penetration testing to assess your system security, but also integrate with architecture review, static code analysis, performance testing as the comprehensive security assessment service against system, network, mobile app and IoT.
ETSI EN 303 645 for IoT Security
After nearly 10 years of development, the implementation of the Internet of Things in various industries has begun to accelerate. While bringing convenience to consumers, cybersecurity issues have gradually emerged.
Medical Device Regulation (MDR)
The safety and quality of medical devices is becoming increasingly important as consumers demand the highest safety standards from suppliers of products and services in the healthcare sector. In addition, international rules and regulations for medical device manufacturers are becoming increasingly complex and stringent. Devices become more innovative and vulnerable to privacy and security threats.
FDA Cybersecurity in Medical Devices
We provide FDA medical cybersecurity technical testing services, covering performance testing (such as the external connection of the device itself, whether to do connection control), third-party applications (mobile app, cloud, and more), or kits security testing (establishment list of device OS, applications, kits, etc.), static and dynamic analysis (providing source code detection, penetration testing, fuzzing, etc. .).
FIPS 140-3 for Cryptographic Modules
With the advancement of cryptographic technology, the FIPS 140 standard has evolved and is now updated to its third edition - FIPS 140-3. All cryptographic module developers, cryptographic accelerator developers, and other regulated industries selling any hardware or software cryptographic module must support the algorithms listed in the FIPS 140-3 approved list.
OT Security Standard IEC 62443
The IEC specifically made IEC 62443 with reference to ISA 99 standard for industrial control security. ISA/IEC 62443 has different series of standards, allowing upstream, midstream and downstream manufacturers in each industrial control field to have their own corresponding standards, without the need to apply to all manufacturers. This approach enables manufacturers to reduce the cost and manpower of introducing cybersecurity standards. Meanwhile, it can quickly find out the cause and take appropriate measures when a cybersecurity incident occurs.
PSTI for Consumer Connectable Product Security
UK PSTI will come into effect in April 2024. Companies involved in the consumer IoT product supply chain are required to comply with the security requirements.
Cybersecurity Services for RED-DA
The European Commission (EC) has announced the adoption of a Delegated Act to the Radio Equipment Directive (RED), which establishes different cybersecurity requirements that manufacturers, importers and distributors must meet to market their wireless devices and products in the European Union.