Latest News

IoT Certification Testing

IoT Certification Testing for ETSI EN 303 645 and beyond

New Firmware Analysis Capability

New Firmware Analysis Capability

Cyber Trust Mark Event

Cyber Trust Mark Event

Keysight joins the IoT Security Foundation

Keysight joins the IoT Security Foundation

We enable compliance checks against leading security standards and regulations such as ANSI / CTA 2088-A, ETSI-EN 303 645, OWASP Top 10, and Cyber Trust Mark (late 2024). Read our App Note to learn more.

We analyze binary firmware files to generate Software Bill of Materials (SBOM), detect vulnerabilities and weaknesses, and identify potential 0-days. For more information, read our new Solution Brief and App Note, or read our blog.

The Cyber Trust Mark is redefining security and privacy for IoT. But what does it mean for manufacturers? If you missed the event on January 24, 2024,  check out the replay to hear from experts at Keysight, Yale Locks, and Google. Read our blog and our report, The Definitive Guide to IoT Security.

Watch the replay of the IoT Security Foundation and Keysight Webinar: Don’t fall victim to IoT security holes. We discuss the importance of full-spectrum security testing of IoT devices, and the certification schemes governments around the world are promoting to elevate security.

Automated IoT Testing

IoT Security Assessment

IoT Security Assessment

Unlike disparate solutions that require users to assemble and separately manage multiple tools, Keysight’s IoT Security Assessment combines traditional vulnerability assessment with industry leading protocol fuzzing as well as our new firmware analysis under an integrated user interface (UI) or REST API. This solution also includes comprehensive reporting on discovered security flaws.

Firmware Analysis Module

New Firmware Analysis Module

We can identify vulnerabilities directly within the device's operating code that includes everything from extracting the Software Bill of Materials (SBOM) to uncover associated vulnerabilities, detecting hard-coded credentials that pose unauthorized access risks, pinpointing configuration flaws, identifying weak or expired cryptographic keys and certificates, to finding vulnerable scripts and binary code.

[an error occurred while processing this directive]

Demo Video - IoT Security Test Plan

Why and how do you test IoT security? Discover how Keysight IoT Security Assessment can perform security tests for certification. Watch Scott Register, Keysight's VP of Security Solutions, navigate the tool's interface and run a sample test plan.

Automated IoT Security Testing

  • Quickly find security flaws with intuitive UI​
  • Integrate security testing into CI/CD pipeline with complete REST API management​
  • Discover unknown network stack and chipset weaknesses with protocol fuzzing​
  • Harden security with vulnerability assessment​
  • Validate Wi-Fi, cellular, Ethernet, CAN bus, Bluetooth, and BLE connected devices

Featured Resources

Want help or have questions?