Auray Technology has been dedicated to providing security testing services since its establishment, including product security testing such as IoT testing services, app and software compliance testing services, and 5G private network security testing services.
For the domestic 5G private network domain, Auray provides testing and verification services, develops security penetration testing tools and protection guidelines, establishes local 5G private network security protection solutions, and strengthens the security protection system of 5G private networks. Through participation in the Expansion Plan and the Aiwai 5G AIoT Project, Auray assists Taiwanese companies in developing the best 5G security solutions for international export.
SCAS Security Testing
Security has always been a major concern for domestic and international telecommunications networks, especially when facing open architectures like O-RAN. Auray provides testing and verification services based on the Security Assurance Specification (SCAS) defined by the O-RAN ALLIANCE.
TS 33 511 Compliance Testing
TS 33511 issued by 3GPP is the security assurance specification (SCAS) for 5G base stations (gNodeB). Auray conducts testing based on the test items specified in this standard.
TS 33 117 Compliance Testing TS 33 117 issued by 3GPP specifies the corresponding security test specifications for the operational security of 5G network systems.
Smart Pole Device Security Testing
Based on the "5G Smart Pole Technical Specification", Auray conducts testing on the information systems of 5G smart poles, including information security, interoperability, and RIC (Radio Intelligent Controller) testing. Auray also participates in formulating the Bureau of Standards, Metrology and Inspection (BSMI) smart pole specification content (Parts 2-1, 2-2, 7-1, 7-2, 10-1, 10-2, 10-3, 10-4).
Product Security Assessment Services provide comprehensive product security development solutions. They offer relevant security services and security product integration at each stage of requirements, design, development, testing and deployment to assist customers in developing software security capabilities that meet regulatory requirements.
Consumer IoT Device Security Testing
ETSI EN 303 645, published by the ETSI Cyber Security Technical Committee, is a standard for network security and privacy protection of IoT (Internet of Things) products. It establishes a security baseline for IoT products, helping to prevent large-scale, prevalent attacks against smart devices.
Security Testing
Auray guides mobile app developers to integrate security concepts into their product development and provides testing reports. This helps customers obtain certification and security labels (such as the MAS security label), improving the security level of their apps and reducing security risks.
Source code scanning involves comprehensively scanning various types of code, such as system code, automation scripts, application code, mobile app code, etc. to identify potential vulnerabilities and weaknesses, which are then addressed through remediation.
Product Testing
IEC 62443-4-2 is a security standard for industrial control system (ICS) products. The standard defines the security requirements for ICS products.
Enterprise security assessment services are a critical information security measure aimed at identifying and remediating security vulnerabilities that could pose threats to the organization. Key aspects include:
Penetration testing is a simulated attack behavior to find security vulnerabilities in a system or network. Penetration testing can help organizations understand the actual state of their security protection and take measures to improve it.
Vulnerability scanning is an automated detection tool that can be used to identify security vulnerabilities in a system or network. Vulnerability scanning can help organizations quickly identify potential security risks and take measures to mitigate them.
Malware detection (antivirus) is a tool used to detect and remove malware. Malware detection can help organizations protect their systems and data from malware attacks.
Cybersecurity assessment is a comprehensive security evaluation that aims to assess an organization's overall security posture. Cybersecurity assessment can help organizations identify weaknesses in their security protection and develop corresponding improvement measures.
Verification Opinion Query
We use cookies to collect and analyze information on site performance and usage. By Clicking "Continue" or by clicking into any content on this site, you agree to allow cookies to be placed. To find out more, please visit our privacy policy。
CONFIRM