1
min reading time
A fraction of aspect and at the same time unthinkable damages.
Here at CCLab, we have always kept our focus on the most critical corners of IT and high-security solutions.
We have been able to develop and widen our experiences throughout the years.
In 2019 our Smart Metering Division has handled a number of projects and we have been able to refocus some of our resources towards the field of IoT.
We believe in the new digital era where IoT devices available with state of the art security.
Thanks to jtsec’s retrospect of 2019, it is easier than ever to identify and understand schemas within high-security products.
As in 2019, we have successfully evaluated 5 products within Common Criteria. We stand proudly in the midfield next to most acknowledged laboratories by the number of evaluations.
See the international report.
This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.
Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.
Download our ETSI EN 303 635 infographics today and learn about the product certification process for this consumer IoT device cybersecurity standard.
The journey of achieving Common Criteria certification represents just the beginning of a complex, ongoing process that demands continuous attention and strategic management. Organizations worldwide invest significant resources in obtaining these prestigious security certifications, yet many underestimate the critical importance of proper lifecycle management once their products become Common Criteria certified. Effective CC certification lifecycle management ensures continuous security assurance, regulatory compliance, and market credibility throughout a product’s operational lifespan.
9
min reading time
Last-minute compliance gaps can derail launch schedules. Designing with the Radio Equipment Directive in 2025 in mind from the very beginning reduces risks, shortens approvals, and creates a competitive advantage.
8
min reading time
Imagine this: weeks from launching a connected device in Europe, hardware set, software frozen, marketing ready, then a wall. A Notified Body flags missing cybersecurity evidence under the Radio Equipment Directive (RED). The fix? A costly, months-long redesign. This happens more often than teams expect. Last-minute failures on cybersecurity aren’t always due to weak security, but missing evidence or test docs RED demands. And it’s not just Europe, globally, security rules are tightening, and buyers are asking tougher questions before contracts. RED’s Articles 3.3(d), 3.3(e), and 3.3(f) are shaping secure-by-design norms worldwide. Manufacturers treating them as a baseline not only pass audits but gain an edge. Embedding these principles early cuts risk, streamlines compliance, and proves to customers that security isn’t an afterthought. Let’s unpack why.
8
min reading time