Common Criteria

Successful Trip to China with our Partner EPT

Last week, SYSGO joined the AUTOMATED VEHICLE SECURITY & SAFETY TECHNOLOGY FORUM in Shenzhen (China). This event was organised by Automotive World China with a focus on autonomous driving safety. In addition to the SYSGO team, we also hosted our local partner EPT team on our booth. It was interesting when listening to the different speakers to see almost …

Successful Trip to China with our Partner EPT Read More »

Picture showing Kontron hardware

SYSGO and Kontron develop fully integrated secure platform for safety-critical railway applications

Kontron and SYSGO have jointly started the development of an integrated platform for safety-critical railway solutions based on Kontron’s SAFe-VX hardware. The aim is to provide customers with a solid and flexible basis for certifiable application in trains and signalling. Kontron brings to the cooperation its proven COTS (Commercial off the Shelf) hardware, which is …

SYSGO and Kontron develop fully integrated secure platform for safety-critical railway applications Read More »

PikeOS Hypervisor certified according to Common Criteria

SYSGO has reached another great milestone with PikeOS. As the first and as of today the only RTOS vendor, we received Common Criteria EAL 3+ certification for the PikeOS Hypervisor. The subject of certification by the Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik – BSI) is the separation kernel in PikeOS, …

PikeOS Hypervisor certified according to Common Criteria Read More »

Security Certification of IoT Devices with a Component-based Software Design

Different security standards exist for different types of IoT applications. Whether you want to meet the Common Criteria for Information Technology Security (ISO 15408), IEC 62443 for Industrial Control Systems, EDSA (Embedded Device Security Analysis) or J3061 in the automotive sector: In a recently published article, SYSGO’s Director R&T Dr. Sergey Tverdyshev shows you how …

Security Certification of IoT Devices with a Component-based Software Design Read More »

Bild: gemeinfrei / CC0

Mit komponentenbasiertem Software-Design zur Security-Zertifizierung für IoT-Geräte

Für unterschiedliche Arten von IoT-Anwendungen existieren auch unterschiedliche Sicherheitsstandards. Ob Sie nun die Common Criteria for Information Technology Security (ISO 15408), die IEC 62443 für Industrial Control Systems, EDSA (Embedded Device Security Analysis) oder J3061 im Automobilbereich erfüllen wollen: In dem kürzlich auf “embedded-software-engineer” veröffentlichten Artikel zeigt Ihnen SYSGOs Director R&T Dr. Inf. Sergey Tverdyshev, …

Mit komponentenbasiertem Software-Design zur Security-Zertifizierung für IoT-Geräte Read More »

Trustworthiness via Security Certification

The last two weeks in Amsterdam were full of security assurance related events. Despite the rainy fall weather, I feel energised and looking optimistically into future of security certification. 🙂   CCUF stands for Common Criteria User Forum. This forum is an open community of security experts, security evaluators, vendors of SW and HW products, …

Trustworthiness via Security Certification Read More »

Trondheim, Norway (Photo: SYSGO)

Standardizing Essential Security Requirements for Separation Kernels

It was quite refreshing to travel to still early spring Trondheim (Norway) from almost summer Rhein-Main valley (Germany). Located in Trondheim Thales Norway and Norwegian University of Science and Technology (NTNU) have hosted the last bi-annual Common Criteria¹ User Forum (CCUF²) from April 24 – 26. I have represented the certMILS project and the MILS …

Standardizing Essential Security Requirements for Separation Kernels Read More »

Hacking the Paper Tiger

Authors: Holger Blasum Dr. Sergey Tverdyshev Certification. Certification is one word that puts a lot of people into a boredom and mental state of being in a swamp. This is definitely partly true. On the other hand a certification process is an analysis of a product from specific view angles. Sometimes these angles are fixed …

Hacking the Paper Tiger Read More »

Will we have security in Industry 4.0 applications?

Industry 4.0 is an extremely interesting topic that once achieved will enable flexible production and re-configurable plants. During the Security Symposium 2016 all keynotes and presentations have an agreement that the current industrial automation pyramid will transform into mesh-network (see Figure 1). This network will enable to reconfigure the installed plant services into new and …

Will we have security in Industry 4.0 applications? Read More »