Assess Third-Party Products' Cybersecurity
CyberPass automates cybersecurity product assessments or certification enabling business acquiring third-party connected devices with confidence.
62% of the attacks on customers took advantage of their trust in their supplier....
ENISA Report - Threat Landscape for Supply Chain Attacks
What is CyberPass ?
CyberPass is a cost-effective and scalable solution that helps companies streamline their cybersecurity procurement, centralize compliance, proactively manage risk, and reinforce trust in their connected products supplied by third-party vendors.
Unlike other alternatives, CyberPass provides an intuitive and user-friendly platform that simplifies compliance assessment and certification processes. It also helps manufacturers extend their reach, centralize evidence, track regulatory obligations, and offer certified products, setting them apart from the competition.
Intuitive & User-Friendly
A very intuitive and easy-to-use solution based on a meta-framework covering the main compliance standards and cybersecurity regulations produced at EU and international level, such as EN 303645, IEC 62443 , ISO 15408, ...
Label & Certification
Provides manufacturers of connected products with a standardized cybersecurity assessment, a label and a certificate that they can share with different customers, as well as a detailed improvement plan to increase the level of maturity of their product
Speed & Efficiency
Combines speed through automation with the precision and efficiency of recognized and accredited laboratories (CAB, ITSEF, CB).providing objective cybersecurity assessment
Commitment & Trust
Directly engages suppliers of connected products around the world with effective assessments and validates the results with an accredited laboratory thus reassuring the entire market value chain
Protection and compliance
- Minimizing the risks of cyberattacks and engaging responsibility through compliance
- Streamline regulations/standards, certifications and maintenance
- Reduce potential lawsuits and product recalls related to cybersecurity
Simple & Scalable
- Get high-level and detailed evaluation reports and benchmarks
- Define your cybersecurity requirements or select relevant standards, schemes and regulations.
- Follow and monitor your products security assurance level and vulnerabilities
- Choose trusted products
- Get full visibility on your ICT/IOT products and all their components portfolio (SBOM)
How It Works
for businesses buying, importing, or redistributing connected products
1Request a Product
Describe the connected product you're looking to procure
2Select Suppliers
Select or add relevant product suppliers
3Select Level & Standard
Select the applicable cybersecurity standard (ex. EN 303645) and security assurance level (ex. L0/Basic)
4Launch Assessment
A notification is sent to the selected suppliers to initiate the requested assessment
5Get Comparative Report
You'll receive comparative assessment results of all selected suppliers via an intuitive dashboard
6Decide & Engage
Make up informative and accurate decision to engage or not with each supplier
7Manage Continuously
You'll have a continuous visibility on the level of security of all your procured products including all their components (new vulnerabilities, changes to compliance or certificate status, etc.)
How It Works
for manufacturers, OEMs or vendors of connected products
1Receive or Initiate Request
You'll receive an RFP from a business client requesting to share your product cybersecurity assessment results, or You initiate a cybersecurity assessment by your own to get your trusted product listed on the platform
2Run Self-Assessment or Third-Party Assessment
Depending on the standard and the level of security assurance requested or selected, You'll have to provide responses to a questionnaire including potentially relevant evidence (design docs, risk-assessment or self-tests results) or You'll be requested to select a recognized or accredited third-party laboratory to share the product and evidence with
3Receive Results & Improvement plan
You'll get your assessment results promptly or within a limited deadline depending on the type of assessment and the level of security assurance. These are shown in an intuitive dashboard with an improvement plan to increase your product's security robustness level
4Share With Your Customers
You could share the received certificate, label or results with your customers, engage with them and get your product listed on the platform
5Manage Continuously
You'll be able to manage the level of security of all your assessed products, build on top of your evidence baseline, manage the certificate status (new vulnerabilities, changes to your products, changes of customers requirements or standards, upgrade level, etc.)
We've heard you
Solving your real problems...
The IoT lifecycle is constantly evolving
- Stricter Regulations
- Certification Continuity must be assured
- Complexity of Vulnerability Management
Each sector has its specific needs
- Cyber Risks vary
- Different levels of security by product type
and operating environment
Connected products are often multi-component
- Different providers
- Several security assurance levels
- Various standards/schemes
Trust Your Connected Products
Project Impacts
Digital | Economic | Societal | Environment | Sovereignty
Fostering cyber assessments in a quantifiable, transparent and recognized way
(via trusted & accredited labs)Improving collective cybersecurity resilience
Reduce risk of cyberattacks on critical sectors
(eg health)Pooling of French, European and International standards
Accelerating the adoption of connected technologies
Establishment of an ecosystem of trust
Reduce the dependence on non-trustable solutions
Securing risks with significant ecological repercussions ( the field of energy, for example...)
Strengthening the sharing of expertise between experts in security assessment and certification
This project was funded by the government as part of France 2030
Ce projet a été financé par le gouvernement dans le cadre de France 2030
© 2024 Red Alert Labs. All rights reserved.