Detects vulnerabilities within IoT (OS, Wi-Fi, LTE, USB, Bluetooth, RS232, etc.)

 

More and more “things” are becoming capable of connecting to the internet. At the same time, crimes targeting IoT have been increasing.

It is necessary to understand the security status and the risk management level of your company to prevent these attacks.

Sectoral Annex on Telecommunications Terminal Equipment and Radio Equipment amended on April 1st, 2020, added to the Telecommunication Business Act that the installation of access restriction is mandatory.

 

Description

Our knowledgeable and experienced security engineers will conduct assessments on your
IoT Devices.

  • Visualizing status
  • Detect vulnerability
  • Risk analysis
  • Compliance support for security standards

 

Assessment objects

  • Confidential information
  • Firmware falsification
  • Physical shell access
  • Plaintext communications
  • Replay attack
  • Man-in-the-middle attack
  • Authentication related

 
Engineers will conduct an interview to design the assessment according to your needs. You will receive a list of recommended security measures along with the report.