1
min reading time
A fraction of aspect and at the same time unthinkable damages.
Here at CCLab, we have always kept our focus on the most critical corners of IT and high-security solutions.
We have been able to develop and widen our experiences throughout the years.
In 2019 our Smart Metering Division has handled a number of projects and we have been able to refocus some of our resources towards the field of IoT.
We believe in the new digital era where IoT devices available with state of the art security.
Thanks to jtsec’s retrospect of 2019, it is easier than ever to identify and understand schemas within high-security products.
As in 2019, we have successfully evaluated 5 products within Common Criteria. We stand proudly in the midfield next to most acknowledged laboratories by the number of evaluations.
See the international report.
This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.
Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.
Download our ETSI EN 303 635 infographics today and learn about the product certification process for this consumer IoT device cybersecurity standard.
The European Union's digital infrastructure is continuously evolving to facilitate secure, cross-border electronic transactions. In this context, two crucial frameworks—the eIDAS regulation and the Common Criteria standard— play pivotal roles. eIDAS (Electronic Identification, Authentication, and Trust Services) aims to unify and enhance electronic identification systems across the EU. Meanwhile, the Common Criteria standard offers a comprehensive framework for evaluating the security of IT products and systems.
7
min reading time
The EUCC scheme, spearheaded by the European Union Agency for Cybersecurity (ENISA), was released in early 2024. It builds on the SOG-IS Common Criteria evaluation framework already used by 17 EU Member States.
7
min reading time
ICT (Information and Communication Technology) products, encompassing a wide range of digital devices and software, are inherently vulnerable due to their complexity and the ever-present potential for undiscovered security flaws. The interconnected nature of these products further amplifies the risk, as a single vulnerability can lead to widespread security breaches across networks and systems. To mitigate these risks, the strategic integration of cybersecurity certification requirements in ICT products has become paramount.
8
min reading time