Claim image
CONTACT

Cybersecurity Evaluations

With an ever-increasing range of connected devices and services in our homes, cities and in industrial and infrastructure settings, cybersecurity has never been so important. From payment systems to network equipment and connected vehicles, our team of experts is experienced in providing evaluation, testing and certification services to help ensure that devices work together with robust security.

200+ cybersecurity experts

With deep knowledge about security evaluation, certification and penetration testing

A Global Footprint

  • Europe: Barcelona, Madrid, Granada
  • North America: Ottawa, Vancouver, Baltimore
  • Asia: Shanghai, Seoul

Market Access

Accredited lab for 30+ security certification schemes, including Common Criteria

 

Security evaluations for 30+ schemes & standards

 

Common Criteria &
NIAP listing

Accredited laboratories by the Spanish, US, and Canadian CC schemes

 

FIPS 140-3 for
Cryptographic Modules

Accredited laboratory for the CMVP and experts in Entropy Source Validation

 

LINCE and the Spain's
CPSTIC Catalogue

Certify your product and get listed in the Spanish catalogue for security IT products

 

EMV-Based Payment 

Secure and Functional evaluations: 

Payment Acceptance 

PCI Schemes

Others Schemes

Telecom, Authentication, Transport

Evaluations for key industry recognized standards

 

Wide experience evaluating Secure ICT products

Smart Card & SE

  • Smart Cards
  • Secure Elements
  • System on Chips (SoC)
  • Passive Wearables
  • Development Sites
  • Production Sites

Network & Telco Solutions

  • Routers, modems, switches, access points, load balancers, firewalls, VPN, Diodes, WAF, etc.
  • 5G infrastructure, eUICC (eSIM)

Software

  • Cloud Services - SaaS
  • Remote Biometric Identification Systems
  • Software Solutions such as PAM, IDS, IPS, CASB, SIEM, EDR & EPP
  • Windows, iOS and Linux based OS

Hardware Security Boxes

  • Payment Terminals
  • Hardware Secure Modules (HSM)
  • Secure Gateways
  • Tachographs
  • Drones

Mobile

  • Android / iOS
  • TEE
  • Mobile Applications including Comm Apps
  • Payment Apps, SDK, Wallets and Wearables

 

Involved in the definition of the future of cybersecurity

Our experts are members of key cybersecurity Working Groups and organizations, and participate in the definition of new cybersecurity certification schemes and evaluation methodologies 

Working Groups & Organizations

  • Enisa EUCC WG
  • Enisa 5G WG
  • SCCG members
  • CCUF management committee members
  • ICCC program committee members

Creators of cybersecurity methodologies and schemes

  • Definition of the potential scheme for Industrial cybersecurity for the European Commision
  • Co-creators of the Spanish LINCE methodology
  • Co-creators of the Crypto methodology used by the Spanish National Cryptographic Center

Automation Tools

We have automated our laboratories to improve efficiency and speed up the certification projects at different levels

Tools for Vendors:

  • CCGen
  • FIPS Portal

Tools for Labs:

  • CCEval
  • LinceEval
  • Greenlight

Tools for Certification Bodies

  • CCCAB

Pentesting Expertise

Hardware Security

State-of-the-art attacks and ad-hoc tools made by lab experts. Fault injection, Side Channel, Reverse Engineering

Software Security

Strong background in SW attacks, including web, fuzzing, embedded systems, secure boot, TEE and Cloud Security

Communications Security

Network Scanning, Eavesdropping, Protocol Fuzzing, Brute Forcing, DDoS, Man-in-the-Middle, Reply Attacks

 

Cryptographic Expertise

Conformance validation of cryptographic implementations, White box crypto, crypto pitfalls

 

Applus+ uses first-party and third-party cookies for analytical purposes and to show you personalized advertising based on a profile drawn up based on your browsing habits (eg. visited websites). You can accept all cookies by pressing the "Accept" button or configure or reject their use. Consult our Cookies Policy for more information.

Cookie settings panel
  • Essential cookies

    They allow the operation of the website, loading media content and its security. See the cookies we store in our Cookies Policy.

    Always active
  • Analytics cookies

    They allow us to know how you interact with the website, the number of visits in the different sections and to create statistics to improve our business practices. See the cookies we store in our Cookies Policy.