NAPS will verify that a network attached peripheral will not introduce vulnerabilities to the network where it is installed, and is not vulnerable to exploitation itself, while still providing its intended services to users.
A firewall is a single point between two or more networks where all traffic must pass (choke point); traffic can be controlled by and may be authenticated through the device, and all traffic is logged.
Enterprises need to know that their mobile apps safeguard sensitive customer and internal data while being safe to use. ICSA Labs provides this reassurance to enterprises through its mobile app testing program.
Secure Socket Layer - Transport Layer Security (SSL-TLS) technology is an important component of a comprehensive enterprise security strategy. SSL-TLS is a widely used protocol for secure network communications.
As an Accredited Test Lab and Office of the National Coordinator Authorized Certification Body (ONC-ACB), ICSA Labs is authorized by the US government to test and certify Health Information Technology products that support Meaningful Use.
ICSA Labs has partnered with IHE USA to create a new testing and certification program addressing advanced interoperability capabilities in Electronic Health Records, Health Information Exchanges and Patient Care Devices.
ICSA Labs will be issuing Excellence in Information Security Testing (EIST) awards on Monday, April 20 at 6pm PST in the Verizon Booth (N3101) at the RSA Conference in San Francisco. The awards recognize clients that have achieved successful completion of 10, 15, or 20 years of continuous ICSA Labs information security testing.
Prepare your enterprise to conduct individualized self-assessments of risk, so you can make realistic decisions on how to avoid cyber threats. The 2015 DBIR expands its investigation into nine common threat patterns and sizes up the effects of all types of data breaches, from small data disclosures to events that hit the headlines.
Procentive v.2014 has achieved ONC HIT 2014 Edition Complete EHR certification, which designates that the software is capable of supporting eligible providers with meeting the Stage 1 and Stage 2 Meaningful Use measures required to qualify for funding under the American Recovery and Reinvestment Act (ARRA).
Someone has to take responsibility for the security and privacy issues attendant to the Internet of Things. In this guest essay posted on ThirdCertainty, George Japak, managing director of ICSA Labs, a vendor-neutral testing and certification organization, outlines who that should be.
ICSA Labs' EIST awards recognize vendors for outstanding achievement in the area of information security certification testing with ICSA Labs. The award is based on a company achieving ten, fifteen or twenty years of continuous testing with ICSA Labs. Visit the EIST Awards page for more information.
When it comes to security, many vendors consider certification of its products by an independent organization an option, not a requirement. However, third party testing is an important element when a company is deciding on technology solutions that are part of its security management program.