Device Model Creation
Together we set up SUM by identifying all components of your device (sw, hw, protocols and interfaces).
SUM is a vulnerability management service for IoT devices. SUM helps you to keep your IoT device secure during its entire lifecycle.
The IoT lifecycle is generally 10+ years. During this time vulnerabilities should be continuously monitored to keep the device secure.
It's not a matter if the device becomes vulnerable, but when.
Building automation
Automotive
Health
Production lines
Smart cities
Utilities
Over 50 new vulnerabilities are reported each day.
It's challenging to keep track of so many vulnerabilities. And how do you know they apply to your product? SUM is solving this problem by continuously monitoring vulnerabilities and only reporting vulnerabilities relevant for your device.
We monitor all device components: software, hardware, protocols and interfaces.
Find the vulnerability before a hacker does.
Satisfy requirements from standards and regulations in your industry (MDR (EU) 2017/745, ISO/SAE 21434, IEC 62443, ETSI 303 645, UL2900 - many more...)
Improve the quality of your internal processes by adopting vulnerability monitoring, thereby keeping your products secure
Show your customers or ecosystem that you implement vulnerability management with SUM to gain trust
Together we set up SUM by identifying all components of your device (sw, hw, protocols and interfaces).
We carry out our scans with our proprietary technology and create a pdf report.
During a call we go over the results and make adaptations where applicable.
You decide the frequency in which you would like to receive updated reports (e.g. monthly, bi-weekly, etc).
We are here to support you.
PEN TESTING on specific vulnerabilities
CONSULTANCY on specific vulnerabilities
Are you looking for more information or for professional consulting?
Fill in the following form to get in touch with us: