CETECOM verifies the IT security of your connected devices.
Connected devices (also Internet-of-Things – IOT) are based on sensor/actuator technology, back-end connections and optionally also gateways and smartphone APPs. Various wireless technologies are used:
The interconnected environment, without proper protection, opens the risk of attacks to the application or individual components. Attackers have three main potential targets to gain access to a networked device or its environment:
Accordingly, the security of the network environment must be ensured to a reasonable degree. This includes:
In addition to our years of experience in the regulatory certification of products with wireless technologies, we can now also offer services in the context of IoT Security and thus another important aspect in the context of the market entry of your products.
As part of the CETECOM IoT Security Services, we verify the current state of the security of your networked devices.
Our service offer includes the following components: