1~5 item / All 5 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Contact this company
Contact Us Online1~5 item / All 5 items

This is an overview of the services provided by the American company wolfSSL, which offers security features for embedded devices and IoT devices. The lightweight and fast TLS library "wolfSSL" supports RTOS and embedded Linux, while ensuring compatibility with OpenSSL. Additionally, "wolfCrypt" can function as a standalone cryptographic module with FIPS compliance and hardware integration capabilities. "wolfBoot" supports secure boot and OTA updates, and also includes tamper detection features. These products are offered with commercial licenses and technical support, making them effective for industrial applications that require compliance with FIPS and ISO standards.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
This is an introduction to the OSS risk management system provided by Onward Security. To address the risks of vulnerabilities and license violations as the use of OSS increases, two tools, "SecSAM" and "SecDevice," are presented. SecSAM is a platform that can integrate and manage CVE, CWE, license information, and SBOM, and it also supports SPDX, CycloneDX, and VEX. SecDevice automatically detects vulnerabilities at the binary level through techniques such as fuzzing and enables centralized risk response in conjunction with SecSAM. This allows for the management of OSS risks throughout the entire lifecycle and contributes to compliance with regulations such as CRA and NIST.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Introducing a one-stop solution provided by IT Access for companies struggling to comply with the EU Cyber Resilience Act (CRA). Engineers with 15 to 30 years of experience assist companies that lack understanding of the CRA or find it difficult to determine compliance standards, supporting everything from organizing security requirements to modifications and obtaining certification. We also support the provision and implementation of necessary tools such as wolfSSL's "wolfBoot" and "wolfCrypt," as well as Onward Security's "SecDevice" and "SecSAM." Furthermore, we provide comprehensive support from evaluation in the test lab to application to the certification body DEKRA, offering holistic assistance for CRA compliance.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
■Features Media-less storage breaks away from the conventional wisdom that storage silicon equals media, offering a new form of storage. By providing a new storage solution equipped with scalability, safety, and sustainability, we assist customers in freeing themselves from storage-related concerns. ■Scalability Media-less storage projects its data onto NAS or the cloud, allowing for changes to storage capacity and contents at any time. This liberates customers from worries related to insufficient capacity. ■Safety Media-less storage allows for changes to device access rights and the contents of projected media from a web UI, either on-premises or in the cloud. This reduces the risk of data leakage from loss or theft. ■Continuity Media-less storage does not have silicon media as a data storage area. Therefore, it is free from lifespan issues and failures associated with traditional silicon media, such as destruction or defects due to excessive writing.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
"SPARK Pro" is a toolset that uses a formally verifiable subset of the Ada 2012 language, bringing mathematically based reliability to software verification. With this product, you can formally define and automatically verify software architecture requirements. It can reduce runtime errors and guarantee properties for a wide range of software integrity, such as the application of safety properties or security policies, and compliance with functional accuracy (conformance to formally defined specifications). [Features] - Data flow analysis - Information flow analysis - Detection of runtime exceptions - Property checking - Level-based verification *For more details, please refer to the PDF materials or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration