Information Securty Test Services

SERVICE

service

Information Securty Test Services

ABOUT US

Information Securty  Test Services Introdution

 

Auray Technology has been dedicated to providing security testing services since its establishment, including product security testing such as IoT testing services, app and software compliance testing services, and 5G private network security testing services.

5G TEST SERVICE

 

 

 

For the domestic 5G private network domain, Auray provides testing and verification services, develops security penetration testing tools and protection guidelines, establishes local 5G private network security protection solutions, and strengthens the security protection system of 5G private networks. Through participation in the Expansion Plan and the Aiwai 5G AIoT Project, Auray assists Taiwanese companies in developing the best 5G security solutions for international export.

INFORMATION SECURITY TESTING

O-RAN

SCAS Security Testing
Security has always been a major concern for domestic and international telecommunications networks, especially when facing open architectures like O-RAN. Auray provides testing and verification services based on the Security Assurance Specification (SCAS) defined by the O-RAN ALLIANCE.

 

3GPP

TS 33 511 Compliance Testing 
TS 33511 issued by 3GPP is the security assurance specification (SCAS) for 5G base stations (gNodeB). Auray conducts testing based on the test items specified in this standard.

 

3GPP

TS 33 117 Compliance Testing TS 33 117 issued by 3GPP specifies the corresponding security test specifications for the operational security of 5G network systems.

 

O-RAN

Smart Pole Device Security Testing
Based on the "5G Smart Pole Technical Specification", Auray conducts testing on the information systems of 5G smart poles, including information security, interoperability, and RIC (Radio Intelligent Controller) testing. Auray also participates in formulating the Bureau of Standards, Metrology and Inspection (BSMI) smart pole specification content (Parts 2-1, 2-2, 7-1, 7-2, 10-1, 10-2, 10-3, 10-4).

 


APPLICATION

 

 

Base Station

Smart Factory

Smart City

PRODUCT SECURITY TEST SERVICE

 

 

 

Product Security Assessment Services provide comprehensive product security development solutions. They offer relevant security services and security product integration at each stage of requirements, design, development, testing and deployment to assist customers in developing software security capabilities that meet regulatory requirements.

 

EN 303 645

Consumer IoT Device Security Testing
ETSI EN 303 645, published by the ETSI Cyber Security Technical Committee, is a standard for network security and privacy protection of IoT (Internet of Things) products. It establishes a security baseline for IoT products, helping to prevent large-scale, prevalent attacks against smart devices.

 

MAS APP

Security Testing
Auray guides mobile app developers to integrate security concepts into their product development and provides testing reports. This helps customers obtain certification and security labels (such as the MAS security label), improving the security level of their apps and reducing security risks.

 

Source Code Scanning

Source code scanning involves comprehensively scanning various types of code, such as system code, automation scripts, application code, mobile app code, etc. to identify potential vulnerabilities and weaknesses, which are then addressed through remediation.

 

IEC

62443-4-2

Product Testing
IEC 62443-4-2 is a security standard for industrial control system (ICS) products. The standard defines the security requirements for ICS products.

 


APPLICATION

 

 

IoT

Mobile Apps

Source Code Scanning

ENTERPRISE TEST SERVICE

 

 

 

Enterprise security assessment services are a critical information security measure aimed at identifying and remediating security vulnerabilities that could pose threats to the organization. Key aspects include:

Penetration testing 

 Penetration testing is a simulated attack behavior to find security vulnerabilities in a system or network. Penetration testing can help organizations understand the actual state of their security protection and take measures to improve it.


Vulnerability scanning

Vulnerability scanning is an automated detection tool that can be used to identify security vulnerabilities in a system or network. Vulnerability scanning can help organizations quickly identify potential security risks and take measures to mitigate them.

Malware detection (antivirus)

Malware detection (antivirus) is a tool used to detect and remove malware. Malware detection can help organizations protect their systems and data from malware attacks.

Cybersecurity assessment 

Cybersecurity assessment is a comprehensive security evaluation that aims to assess an organization's overall security posture. Cybersecurity assessment can help organizations identify weaknesses in their security protection and develop corresponding improvement measures.

APPLICATION

 

 

System and Network

Enterprise

Connected vehicles

ABOUT SERVICE CONTACT Inspection query

Verification Opinion Query

We use cookies to collect and analyze information on site performance and usage. By Clicking "Continue" or by clicking into any content on this site, you agree to allow cookies to be placed. To find out more, please visit our privacy policy

CONFIRM