thumbnail image
  • Login
GET IN TOUCH
  • HOME
  • ABOUT US 
    • Who we are
    • They trust us
    • Careers
    • Contact
  • WHAT WE DO 
    • Training
    • IoT Security Analysis
    • IoT Security Profile
    • Certification Evidence
    • Pentesting & Certification
    • Solutions By Industry
  • BLOG
  • KNOWLEDGE 
    • Brochures
    • News | Social Feed
    • Videos | Webinars
  • …  
    • HOME
    • ABOUT US 
      • Who we are
      • They trust us
      • Careers
      • Contact
    • WHAT WE DO 
      • Training
      • IoT Security Analysis
      • IoT Security Profile
      • Certification Evidence
      • Pentesting & Certification
      • Solutions By Industry
    • BLOG
    • KNOWLEDGE 
      • Brochures
      • News | Social Feed
      • Videos | Webinars
  • Login
GET IN TOUCH
  • HOME
  • ABOUT US 
    • Who we are
    • They trust us
    • Careers
    • Contact
  • WHAT WE DO 
    • Training
    • IoT Security Analysis
    • IoT Security Profile
    • Certification Evidence
    • Pentesting & Certification
    • Solutions By Industry
  • BLOG
  • KNOWLEDGE 
    • Brochures
    • News | Social Feed
    • Videos | Webinars
  • …  
    • HOME
    • ABOUT US 
      • Who we are
      • They trust us
      • Careers
      • Contact
    • WHAT WE DO 
      • Training
      • IoT Security Analysis
      • IoT Security Profile
      • Certification Evidence
      • Pentesting & Certification
      • Solutions By Industry
    • BLOG
    • KNOWLEDGE 
      • Brochures
      • News | Social Feed
      • Videos | Webinars
  • Pentesting & Certification

     

  •  

     

  • Your best companion to face IoT cybersecurity threats and their consequences

    IoT requires a feasible distributed trust strategy to overcome the drawback of existing security models. Applying trust to IoT is no longer about designing and developing individual models, but is about how to provide a pool of security models covering the whole IoT infrastructure which includes IT and physical infrastructures (devices, sensors, etc.)

     

    Our IoT security evaluation laboratory will allow you to achieve this latter by performing a full examination of your products, architectures or systems going from Chip to Cloud based on a unique, specific and methodical expertise in all IoT verticals.

  • IoT Security Assurance Levels

    for "chip" makers and "thing" makers (products or solutions) leveraging Transparency and Trust !

    ! Get Certified !

    IoT Security | Consumer | Entreprise

    BASIC

    Consumer | Enterprise

    The ETSI Technical Committee on Cybersecurity (TC CYBER) has released EN 303 645, a standard for cybersecurity in the Internet of Things, to establish a security baseline for internet-connected consumer products and provide a basis for future IoT certification schemes.

     

    Red Alert Labs conducts a highly efficient, fast (1-5 days) and objective evaluation process focusing on common baseline of security requirements to address specific security aspects of IoT products/solutions covering common attacks and known IoT vulnerabilities.

     

    Learn more...

    IoT Security | Consumer | Entreprise | Industrial

    SUBSTANTIAL

    Consumer | Enterprise | Industrial

    Red Alert Labs conducts a highly efficient, fast (5-15 days) and objective evaluation process focusing on business-line risks defined for each Security Profile taking into account the threat model relevant to a type of IoT product/solution and its specific operational environment. EUCC, EN 17640 / FITCEM, Eurosmart IoT, IoXtAlliance (New), ...

     

    Get Started with IoXtAlliance...

    IoT Security | Industrial| Critical

    HIGH

    Industrial | Critical

    Common Criteria (CC) and standards like EN 17640 / FITCEM, Securite de Premier Niveau (CSPN) or equivalent is fast-becoming popular to cover High security level of assurance.

     

    Red Alert Labs supports you during all the stages of the evaluation process covering state-of-the-art attacks and unknown IoT vulnerabilities.

  • IoT Independent Security Approach

    Providing a proof of the level of security based on our unique expertise in the IoT domain for all verticals in an independent approach
     

    Black Box

    • simulates real world scenarios
    • attacker has no knowledge of the interior workings of the product, infrastructure or system
    • partly exhaustive & least time-consuming
    • fast identification of the first level of security
    • fast patching

    Gray Box

    • simulates real world scenarios
    • attacker has limited knowledge of the internal workings of the product, infrastructure or system
    • exhaustive & partly time-consuming
    • identification in a semi-comprehensive way the level of security
    • fast patching

    White Box

    • detailed investigation of internal logic and structure of the code of a product, an application or system while covering a wider area
    • allows businesses to be on their highest guard
    • most exhaustive &time-consuming
    • identification in very comprehensive way the level of security & design errors
    • detailed security patching

     

  • Key Benefits

    Adoption => Trust => Evaluation

    1

    Incentive & Transparency

    Create incentives for consumers while leveraging transparency and trust

    2

    Marketing Differentiation

    Security is not a feature !

    Show the Value of your Secure Solution

     

    3

    Access New Markets

    Keeping up with new regulations nationally and internationally

     

    4

    Accurate Decision

    Allow buyers and sellers making informed decisions

     

  • We secure all your IoT environment

    Hardware Analysis & Assessment

    • IoT device reverse engineering
    • IoT device disassembling
    • Mapping out components
    • Uncovering known and unknown vulnerabilities

     

    Software Analysis & Assessment

    • Encryption analysis and obfuscation techniques
    • Reverse engineering firmware binaries
    • 3rd party libraries and SDKs
    • Debugging binaries to gain sensitive information

    Signal and Communication Protocol Enumeration and Analysis

    • Device infrastructure and protocols (Zigbee, Wifi, etc.)
    • Communications captures (Radio, Bluetooth, etc.)
    • Analysing cryptographic protocols
    • Analysing interaction with external components

    Mobile Applications

    • Data storage (ex: sensitive data)
    • Transport data (ex: information disclosure)
    • Authentication/Authorization (ex: certificate validation)
    • Session management (ex: resiliency)
    • Data validation (ex: through IPC channels)
  • Using our innovating in-house tools, we do support you through your

    • SECURITY AUDITING/EVALUATION using specialized techniques. Indeed, we take an exhaustive approach starting by​
    • REVIEWING the entire product life-cycle ecosystem, from hardware to software, covering physical and logical attacks on the device, network and service domains. All this while making sure we
    • IDENTIFY first your sensitive assets and the target of evaluation and then
    • PRIORITIZE attack paths and vulnerabilities (through Automated testing) so you can smartly
    • BALANCE risk with time-to-market pressures.

    Red Alert Labs facilities physical and logical measures are based on the general requirements for the competence of testing and calibration laboratories, processes and services as laid down in the ISO/IEC 17025:2017.

  • Request now a Security Profile, Test or Certification

    for your IoT product or solution

    And get an early ticket to meet the upcoming European and International Standards.

    Answer a 5 min online questionnaire to GET A QUOTATION NOW!

    GET A QUOTATION NOW!
  •  

     

     

    3 Rue Parmentier, 94140 Alfortville, Paris Area - FRANCE
    Red Alert Labs S.A.S.U
    827 677 303 R.C.S. Créteil
    +33 9 51 79 07 87
    +33 9 51 79 07 87
    contact@redalertlabs.com
    Get started

© 2023 Red Alert Labs. All rights reserved.

Terms & Conditions
Privacy Policy
    Appelez
    Retrouvez
    Contact
Cookie Use
We use cookies to ensure a smooth browsing experience. By continuing we assume you accept the use of cookies.
Learn More