Product Testing and Certification

Cybersecurity for Connected Products

Why Cybersecurity Matters for Connected Products?

The growing connectivity of devices brings convenience, innovation, and new business opportunities. However, it also introduces risks, from unauthorized access to data breaches and compliance violations. At SIQ, we help you navigate the complexities of cybersecurity, ensuring your products meet industry standards and protect end users.

Submit your inquiry

 

Comprehensive Cybersecurity Solutions for IoT

We provide tailored services to ensure the cybersecurity of your connected products, including:

  • Risk Assessments and Threat Analysis: Identifying vulnerabilities in your products and systems.
  • Regulatory Compliance: Helping you meet standards like RED Article 3.3, ETSI EN 303 645, and more.
  • Penetration Testing: Simulating real-world attacks to identify and address potential weaknesses.
  • Certification Services: Guiding you through certification processes to meet global market requirements.

Compliance with Radio Equipment Directive (RED 2014/53/EU) Article 3.3

Which Products Fall Under RED 3.3?

  • Mobile devices and smartphones
  • Smartwatches and wearable devices
  • Smart home devices and IoT devices
  • Drones and unmanned aerial vehicles (UAVs)
  • Connected vehicles (automotive IoT)
  • Modems, routers, and communication modules
  • Smart meters
  • Payment systems and mobile POS devices
  • Emergency response equipment

Ensuring Security for Connected Products

RED Article 3.3 mandates that connected products meet stringent cybersecurity requirements. This includes ensuring the following:

  • Protection of Network Functionality: Radio equipment must not disrupt network operations or misuse resources.
  • Safeguarding Personal Data and Privacy: Internet-connected devices, such as wearables and smart toys, must protect user data and privacy.
  • Secure Handling of Financial Data: Devices that process virtual money or hold monetary value must securely manage this sensitive information.

To help manufacturers and businesses comply with these requirements, the EN 18031 standards provide a clear and actionable framework:

  • EN 18031-1: Focuses on compliance with Article 3.3(d), ensuring devices maintain network functionality and efficiently use resources.
  • EN 18031-2: Addresses Article 3.3(e), emphasizing the protection of personal data and user privacy for connected devices.
  • EN 18031-3: Covers Article 3.3(f), ensuring secure processing of financial and monetary data.

How can SIQ help?

  • Workshops on RED Article 3.3.
  • Testing according to the requirements of EN 18031 and EN 303 645.
  • Evaluation according to UK PSTI requirements.
  • Risk analysis and GAP analysis.
  • Testing and certification services.

Penetration Testing and Security Assessments to Protect Your Business

Are your digital assets vulnerable to cyber attack? We can help you to protect it.

Comprehensive Support for EU Cybersecurity Directive Compliance

We are fully equipped to assist customers in meeting the requirements of the new EU Cybersecurity Directive. This service expansion is designed to help companies protect their digital infrastructure, ensuring compliance with the latest cybersecurity standards and regulations.

We are accredited for ISO 27001 and eIDAS regulations and provides services aligned with key standards such as ETSI EN 303 645 and EN 18031, ensuring that clients not only meet regulatory requirements but also enhance the overall security of their products and systems.

With the introduction of these services, we aim to be a reliable partner in navigating the increasingly complex cybersecurity landscape, helping companies safeguard their assets, fulfill legal obligations, and maintain consumer trust in the digital age.

Let's start a project together

Do you have a question regarding information security? We are looking forward to hearing from you and will get in touch with you right away to discuss further details.

Contact us