IoT secure communication module Protection Profile (PP) developed is evaluating and certifying by Germany National Cybersecurity authority (BSI)* according to ISO/IEC 15408, it will be the 1st International recognized security specification/requirements for your IoT product. 

*Note The PP evaluation and certification process expected to be completed by Q3 2019.

The Common Criteria for IT Security Evaluation (CC, ISO/IEC 15408) is one of the most popular and market (include Asia, EU, Middle-East and US market) recognized IT Security Assurance Certificates for your ICT product.

Personal Data Protection, EU GDPR (and ePrivacy regulation), Trade Secret, Asset management, Information Security Risk Management, Incident and Problem, Access controls on environmental, facilities, equipment, people, communication, networking, system, and application.

Personal Data Protection, EU GDPR (and ePrivacy regulation), Trade Secret, Asset management, Information Security Risk Management, Incident and Problem, Access controls on environmental, facilities, equipments, people, communication, networking, system and application

  • Effective immediately - spot malicious threat immediately 
  • Maximum 2 weeks
  • 500,000,000 Personal Data Stolen or Lost in 2015
  • Crypto-ransomware Attacks Grew by 35%

To compliance with ISO/IEC 27001, the organisation shall demonstrate its capability on conducting an effective Internal Audit, to ensure the management system fulfills legal (i.e. EU GDPR, DPA, IPRs), legislation, standards (i.e. ISO, IEC, IEEE), contractual obligation (i.e. Trade Secret, IP), policy and procedures requirements.

Also, the competence to plan, operation and continual improvements the management system to control the risks and achieve its expected outcome.

Common Criteria for IT Security Evaluation (CC, ISO/IEC 15408) are International recognized IT and Product security evaluation and certification (EAL, evaluation assurance level) scheme.

Personal Data Protection, EU GDPR (and ePrivacy regulation), Trade Secret, Asset management, Information Security Risk Management, Incident and Problem, Access controls on environmental, facilities, equipments, people, communication, networking, system and application

Page 1 of 4
Go to top
JSN Educare is designed by JoomlaShine.com | powered by JSN Sun Framework