Cybersecurity Certification
Applus+ Laboratories works with developers and vendors of ICT products, components, and systems to ensure that their functionality and cybersecurity meets all applicable requirements and standards.
jtsec and Lightship Security recently joined the global network of Cybersecurity Labs of Applus+ Laboratories. jtsec offers a unique framework for the Common Criteria certification process (CCToolbox and CCCAB), and its innovative and automated approach is a key factor to meet the time-to-market requirements of our clients.
We perform interoperability and cybersecurity compliance testing for Chips, Smartcards, Secure Elements, Cryptographic Modules, Mobile Handsets, Software Applications and Network Equipment, among other product types, to provide certification for major schemes like Common Criteria, SOG-IS, FIPS, LINCE, EMVCo, GSMA, PCI, ETSI EN 303 645, IEC-62443-4 and more.
With these cutting-edge facilities found worldwide, and technical expertise across industries such as aerospace, defense, automotive, payment, identification and telecommunications, our services facilitate market access at the speed of development.
For more than 130 years, companies around the world have depended on Intertek to help ensure the quality and safety of their products, processes and systems.
Intertek provides complete Cybersecurity Certification, Testing, Assurance, and Inspection services assuring your product is cyber secure.
We go beyond testing, inspecting and certifying products; we are a Total Quality Assurance provider to industries worldwide. Through our global network of state-of-the-art facilities and industry-leading technical expertise we provide innovative and bespoke Assurance, Testing, Inspection and Certification services to customers.
Intertek is an industry leader with more than 43,800 employees in 1,000 locations in over 100 countries. We deliver Total Quality Assurance expertise 24 hours a day, 7 days a week with our industry-winning processes and customer-centric culture.
Trustworthy. Transparent. Accountable.
Businesses and organizations have always needed security and trust; they’re fundamental to success. With today’s cybersecurity challenges, the bar has risen to “mission critical” with the need for widespread visibility, accountability, and assurance. From customers to the Board of Directors, investors, regulators, and global media – a comprehensive security strategy and the trust of our digital systems are essential to keep pace.
Security is our strategy, as we focus on adapting our business to address the fastest, most demanding changes we have ever faced as a company, as an industry, and as a world. It’s our holistic approach to security, privacy, and trust that sets us apart.
For more information visit trust.cisco.com
Secure-IC, the Security Science company, has established a thought leadership position in the cybersecurity world for embedded systems.
With a presence in 20 countries, across 5 continents, Secure-IC sets itself apart by accompanying customers along the IC lifecycle cybersecurity challenges providing best in class protection technologies, integrated Secure Elements (iSE) and security IPs (SecuryzrTM), with evaluation tools for security assurance and certification readiness (LaboryzrTM.)
We protect companies against cyber-physical attacks and guarantee at each stage of the design process that the optimal security level is reached for a given vertical market application.
Teron Labs is an independent security testing laboratory, based in Australia, but with a global
reach. Our goal is to help organisations around the world to gain certifications in a timely and
predictable manner. We understand that delays in the certification process can result in a loss of
sales for your business, therefore, we are able to work with you closely throughout the product
development and evaluation processes to make sure that your product is able to be certified
without encountering any roadblocks. Unlike other laboratories, which are embedded within
large multinational and general cyber security services organisations, the focus of Teron Labs is
security testing of ICT products, specialising in FIPS 140-2 and Common Criteria. This focus,
together with a simpler business structure and low overheads, provides Teron Labs with a
competitive edge in delivering personalised consulting and testing solutions.
TÜV Informationstechnik – based in Essen, Germany – is one of the world’s leading IT security service providers. We offer various Cyber Security services that are oriented towards your specific requirements: from one-time projects to regular tests, and certifications. With our problem-solving approaches, you are optimally prepared to identify vulnerabilities, eliminate them sustainably, and continuously increase your security level. TÜViT combines the necessary expertise and know-how in its evaluation body “IS-revision and penetration testing”, so that your data, IT and business processes are sustainably protected. Especially in the field of Industrial Security, we provide you with all services associated with IEC 62443 standard from a single source. We can look back on numerous projects in this field, as well as our participation in IEC standardization committees.
Our portfolio also includes software and hardware evaluation, IoT/Industry 4.0, data protection, ISMS, smart energy, mobile security, automotive security, eID and trust services as well as the testing and certification of data centers for physical security and high availability.
TÜV Informationstechnik, founded in 1995, is a member of the TÜV NORD GROUP, one of the world’s largest technology service providers with over 14,000 employees and business activities in 100 countries worldwide.
atsec information security is an international, independent, standards-based Information Technology security consulting, evaluation, and testing services company that combines a business-oriented approach to information security with in-depth technical knowledge. Through our presence in Europe, U.S. and Asia, we address commercial and government sectors worldwide. Our colleagues are experts in various technologies, including operating systems, databases, network devices, embedded systems, and many more.
Our laboratories evaluate and test commercial products against standards such as Common Criteria, FIPS 140-3, O-TTPS, PCI, ISO/IEC 27001, and NESAS to assure users about the security of products they buy and use. We have conducted many vulnerability assessments, cryptographic tests, security audits, and independent assessments for customers of varying sizes, including customers in the telecommunications, financial, energy, and defense sectors.
atsec is a leader and key contributor to the industry, as evidenced by our founding of the annual International Cryptographic Module Conference (ICMC). We actively contribute to the various Common Criteria working groups, the ISO working group that authors the standard for cryptographic module validation, known as ISO/IEC 19790, to the GSMA security groups, and to the European Cyber Security Act working groups.
DEKRA offers an extensive testing & certification services portfolio to prepare customers’ products to comply with any market requirements. From Connectivity testing, Product Safety Testing and EMC & RF testing, to Medical Devices services, Product certification and Cybersecurity evaluation services for IoT, E-mobility, consumer and industrial products, as well as for many other sectors and ecosystems. These services are provided at its global network of accredited laboratories and state-of-the-art facilities, such as DEKRA’s Connected & Automated driving proving grounds equipped with test tracks with V2X technologies, 5G and international networks.
eShard is a leading, independent security expert for in-depth security in ICs, software and IoT devices. Since 2016, the company has developed internationally in Europe, North America and Asia.
Working in defense and aerospace, finance, high-tech, health and semiconductor industries, the company helps its customers to address the complex security challenges related to cybersecurity, including protection of personal data, transactions, and intellectual property. eShard provides its cutting edge software solutions as well as security expertise services such as mobile application and backend penetration testing.
eShard is headquartered in Bordeaux, France, and has offices in France, Singapore, UK and Germany. Today, eShard group has more than 35 experts.
S2P designs and manufactures 3D physical anti-tampering devices at system level, to protect against physical intrusion in highly secured electronics systems, where the tamper resistance is mandatory: banking, states, military, critical industrial sites, … We create a complete envelope of protection around the electronic module by integrating a 3D mesh of conductive tracks all over complex 3D surfaces, and associated electronic control and management. Our products lead to higher security, with a simple assembly, and an increase in the design freedom of your final products. It fully fits with highest level of standards like PCI, FIPS or Common Criteria.
The European Cyber Security Organisation (ECSO) is a non-for-profit organisation, established in 2016. ECSO unites more than 250 European cybersecurity stakeholders, including large companies, SMEs and startups, research centres, universities, end-users, operators, associations and national administrations. ECSO works with its Members and Partners to develop a competitive European cybersecurity ecosystem providing trusted cybersecurity solutions and advancing Europe’s cybersecurity posture and its technological independence.
More information: www.ecs-org.eu.
With over 25 years of experience, Eurosmart gathers technological experts in the field of Digital Security. This Brussels-based association advocates for a high security level in digital interactions.
Members of Eurosmart are designers or manufacturers of secure elements, semiconductors, smart cards, systems on chip, High Security Hardware and terminals; biometric technology providers; system integrators; secure software and application developers and issuers. Members are also involved in security evaluation as laboratories, consulting companies, research organisations and associations.
The Common Criteria Users Forum (CCUF) was founded in 2012 and is a community based around those using the Common Criteria and ISO/IEC 15408 standards. The CCUF is an evolution of the CC Vendors’ forum (founded in 2004) and the CC Forum (founded in 2010). The Common Criteria Users’ Forum mission is to provide a voice and communications channel between the CC community and the CC organizational committees, CC evaluation schemes, and policy makers.
GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy and manage digital services and devices in line with their business, security, regulatory and data protection needs.
OASIS is a nonprofit consortium advancing open standards and open source development on a global scale. We’re the home of KMIP, STIX, TAXII, OpenC2, PKCS#11, SAML and CACAO course-of-action playbooks. One of our largest open source projects is the Open Cybersecurity Alliance (OCA). OCA is building an open ecosystem where cybersecurity products interoperate without the need for customized integrations. OCA open project operates independently under industry-approved process and IPR policies. All are welcome to participate.
Trusted Connectivity Alliance (TCA) is a global, non-profit industry association working to enable trust in a connected future. The organisation’s vision is to drive the sustained growth of a connected society through trusted connectivity which protects assets, end user privacy and networks.
TCA members are leaders within the global Tamper Resistant Element (TRE) ecosystem, and work collectively to define requirements and provide deliverables of a strategic, technical and marketing nature. This enables all stakeholders in our connected society to benefit from the most stringent secure connectivity solutions that leverage TCA members’ expertise in tamper proof end-to-end-security.
Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Through its member-driven work groups, TCG enables the benefits of trust in computing devices from mobile to embedded systems, as well as networks, storage, infrastructure, and cloud security. TCG has over 100 members from across computing, including component vendors, software developers, systems vendors, drive makers and network and infrastructure companies. More than a billion devices include TCG technologies.