www.cybersecurity-certification.com Open in urlscan Pro
18.157.120.97  Public Scan

Submitted URL: https://cybersecurity-certification.com/
Effective URL: https://www.cybersecurity-certification.com/
Submission: On July 27 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

PRODUCT CYBERSECURITY CERTIFICATION PLATFORM

 * 
 * * Login

 * JOIN US
 * ICT/IoT PRODUCTS CERTIFICATION
 * CERTIFICATION SCHEMES
 * TRUST
 * MARKETS
 * CERTIFICATION FRAMEWORK
 * SECURITY ASSURANCE LEVELS
 * BEACH
 * AIR TICKET
 * AIR TICKET
 * CONNECT
 * …  
   * JOIN US
   * ICT/IoT PRODUCTS CERTIFICATION
   * CERTIFICATION SCHEMES
   * TRUST
   * MARKETS
   * CERTIFICATION FRAMEWORK
   * SECURITY ASSURANCE LEVELS
   * BEACH
   * AIR TICKET
   * AIR TICKET
   * CONNECT



PRODUCT CYBERSECURITY CERTIFICATION PLATFORM

 * 
 * * Login

 * JOIN US
 * ICT/IoT PRODUCTS CERTIFICATION
 * CERTIFICATION SCHEMES
 * TRUST
 * MARKETS
 * CERTIFICATION FRAMEWORK
 * SECURITY ASSURANCE LEVELS
 * BEACH
 * AIR TICKET
 * AIR TICKET
 * CONNECT
 * …  
   * JOIN US
   * ICT/IoT PRODUCTS CERTIFICATION
   * CERTIFICATION SCHEMES
   * TRUST
   * MARKETS
   * CERTIFICATION FRAMEWORK
   * SECURITY ASSURANCE LEVELS
   * BEACH
   * AIR TICKET
   * AIR TICKET
   * CONNECT




 * CHECK IT OUT...
   
   CYBERPASS DECIPHERS PRODUCT CYBERSECURITY CERTIFICATES/LABELS AND GENERATES
   THE CYBERSECURITY CONFORMITY AND ASSURANCE OF CONNECTED PRODUCTS.
   
   REQUEST A DEMO

 * ICT/IOT PRODUCTS CYBERSECURITY CERTIFICATION
   
    
   
   THIS PLATFORM IS INTENDED TO GUIDE YOU THROUGH YOUR ICT/IOT PRODUCT
   CYBERSECURITY CERTIFICATION UNDER NATIONAL, EUROPEAN OR INTERNATIONAL
   REGULATIONS.
   
   CYBERPASS IS A COST-EFFECTIVE AND SCALABLE SOLUTION THAT HELPS COMPANIES
   STREAMLINE THEIR CYBERSECURITY PROCUREMENT, CENTRALIZE COMPLIANCE,
   PROACTIVELY MANAGE RISK, AND REINFORCE TRUST IN THEIR CONNECTED PRODUCTS
   SUPPLIED BY THIRD-PARTY VENDORS.
   
    
   
   UNLIKE OTHER ALTERNATIVES, CYBERPASS PROVIDES AN INTUITIVE AND USER-FRIENDLY
   PLATFORM THAT SIMPLIFIES COMPLIANCE ASSESSMENT AND CERTIFICATION PROCESSES.
   IT ALSO HELPS MANUFACTURERS EXTEND THEIR REACH, CENTRALIZE EVIDENCE, TRACK
   REGULATORY OBLIGATIONS, AND OFFER CERTIFIED PRODUCTS, SETTING THEM APART FROM
   THE COMPETITION.
   
    

 * EUCC SCHEME
   
   Live
   
   CLOUD SECURITY CERTIFICATION
   
   Ongoing
   
   5G SECURITY CERTIFICATION
   
   Ongoing
   
   CYBER RESILLIENCE ACT | RED DELEGATED ACT | PSTI
   
   Live

 *  
   
   TRUST SHOULD BE FURTHER STRENGTHENED BY OFFERING INFORMATION IN A TRANSPARENT
   MANNER ON THE LEVEL OF SECURITY OF ICT PRODUCTS, ICT SERVICES AND ICT
   PROCESSES ...”
   
    
   
   “AN INCREASE IN TRUST CAN BE FACILITATED BY UNION-WIDE CERTIFICATION
   PROVIDING FOR COMMON CYBERSECURITY REQUIREMENTS AND EVALUATION CRITERIA
   ACROSS NATIONAL MARKETS AND SECTORS.”
   
   EU CYBERSECURITY ACT – SECTION (7)
   
   

 * CONSUMER
   
   MARKET
   
   
   
   ENTREPRISE
   
   MARKET
   
   
   
   INDUSTRIAL
   
   MARKET
   
   
   
   CRITICAL
   
   MARKET
   
   

 * THE EU CYBERSECURITY CERTIFICATION FRAMEWORK DEFINES A MECHANISM TO ESTABLISH
   EUROPEAN CYBERSECURITY CERTIFICATION SCHEMES AND TO ATTEST THAT THE ICT
   PRODUCTS, PROCESSES AND SERVICES THAT HAVE BEEN EVALUATED IN ACCORDANCE WITH
   SUCH SCHEMES COMPLY WITH SPECIFIED SECURITY REQUIREMENTS. ENISA HAS A PIVOTAL
   ROLE IN THE DESIGN OF THE CANDIDATE EU CYBERSECURITY CERTIFICATION SCHEMES.
   THE CSA PROVIDES CLEAR GUIDELINES REGARDING HOW THESE SCHEMES SHOULD BE
   DESIGNED IN THE ARTICLES BELOW:
   
    * ARTICLE 51 - SECURITY OBJECTIVES OF EUROPEAN CYBERSECURITY CERTIFICATION
      SCHEMES
    * ARTICLE 52 - ASSURANCE LEVELS OF EUROPEAN CYBERSECURITY CERTIFICATION
      SCHEMES
    * ARTICLE 54 - ELEMENTS OF EUROPEAN CYBERSECURITY CERTIFICATION SCHEMES
   
   PROPOSAL FOR REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL ON
   ENISA, THE "EU CYBERSECURITY AGENCY", AND REPEALING REGULATION (EU) 526/2013,
   AND ON INFORMATION AND COMMUNICATION TECHNOLOGY CYBERSECURITY CERTIFICATION
   ("CYBERSECURITY ACT"), ST 15786 2018 INIT.
   
    
   
   
   more details...

 * BASIC
   
   CONSUMER / ENTREPRISE
   
   A European cybersecurity certificate or an EU statement of conformity
   referring to assurance level ‘basic’ provides assurance that the ITC
   products, services and processes meet the corresponding security
   requirements, including security functionalities, and that they have been
   evaluated at a level intended to minimise the known basic risks of
   cyberincidents and cyberattacks.
   
    
   
   • The evaluation activities should include at least a review of the technical
   documentation or, failing that, substitute evaluation activities with
   equivalent effect.sentence or two describing this item.
   
   SUBSTANTIAL
   
   ENREPRISE / INDUSTRIAL
   
   A European cybersecurity certificate referring to assurance level
   ‘substantial’ provides assurance that the ITC products, services and
   processes meet the corresponding security requirements, including security
   functionalities, and that they have been evaluated at a level intended to
   minimise cybersecurity risks, cyberincidents and cyberattacks carried out by
   actors with limited skills and resources.
   
    
   
   • The evaluation activities should include at least:a review to demonstrate
   the absence of known vulnerabilities;testing to demonstrate that the
   products, service or processes correctly implement the security
   functionalities;failing that, substitute evaluation activities with
   equivalent effect.
   
   HIGH
   
   INDUSTRIAL / CRITICAL
   
   A European cybersecurity certificate referring to assurance level ‘high’
   provides assurance that the ITC products, services and processes meet the
   corresponding security requirements, including security functionalities, and
   that they have been evaluated at a level intended to minimise the risk of
   state-of-the-art cyberattacks carried out by actors with significant skills
   and resources.
   
    
   
   • The evaluation activities should include at least: a review to demonstrate
   the absence of known vulnerabilities;testing to demonstrate that the
   products, service or processes correctly implement the security
   functionalities;an assessment of their resistance to skilled attackers using
   penetration testing;failing that, substitute activities.

 * 
 * 
 * 

 * CONNECT WITH US
   
   CONTACT (AT) REDALERTLABS.COM
   
   
   





© 2020








Cookie Use
We use cookies to ensure a smooth browsing experience. By continuing we assume
you accept the use of cookies.
Accept
Learn More