Publications

Find out what evaluation schemes exist, how they compare to each other, and how to choose the most appropriate one.

Security Evaluation of Connected Devices: Evaluation Criteria and Evaluation Schemes

We are increasingly surrounded by connected devices which hold highly sensitive data. The security stakes are high, and attacks are increasing. It is necessary to create trust through appropriate security evaluation schemes.

In this white paper, you will get a benchmark of the existing evaluation schemes suited to the evaluation of connected devices.

Fill in the form to get your copy of the white paper.

You will receive an e-mail with a link to download the document.






By submitting data from this website you agree to the privacy policy of Trusted Labs.