CTIA Cybersecurity Certification Test Plan for IoT Devices

August 21, 2018

The purpose of this document is to define the CTIA Certification Program testing requirements for CTIA Cybersecurity Certification of managed Internet of Things (IoT) devices. For the purpose of this document, an IoT device contains an IoT application layer that provides identity and authentication functionality and at least one communications module supporting either LTE or WiFi®.

Spotlight

Telesoft Technologies Ltd

Telesoft Technologies is a proven and trusted global provider of government infrastructure, cyber security and telecoms mobile products and services. We work with integrators and Service Providers to develop, manufacture and support systems that generate revenue, keep critical infrastructure operational and important data safe on legacy high density TDM, optical SONET/SDH and latest technology multi 100Gbps networks.

OTHER WHITEPAPERS
news image

Private 5G Mobile Networks for Industrial IoT

whitePaper | March 1, 2020

Private mobile networks designed and deployed specifically for enterprise users provide opportunities to optimize and redefine business processes in ways that are either impractical or not possible within the limitations of wired and Wi-Fi networks. For industrial users, the ability to design mobile networks to meet the coverage, performance, and security requirements of production-critical applications is fundamental to the new wave of cyberphysical systems known as Industry 4.0.

Read More
news image

WHY LoRaWAN® IS THE FOUNDATION FOR SMART BUILDING SUCCESS

whitePaper | March 12, 2020

Smart buildings present an obvious sector of the market in which Internet of Things (IoT) enabled services can generate efficiencies, improved user experiences and profits. Much of the early focus has been on utilizing IoT applications to generate savings in utility consumption but this is now widening to encompass applications that support the new ways that people use the buildings they live and work in. Popular applications include room and desk sharing, individual environmental control, predictive maintenance and many others.

Read More
news image

IoT at the Edge: HOW AI WILL TRANSFORM IOT ARCHITECTURE

whitePaper | May 23, 2021

The vast amounts of data constantly collected by the billions of sensors and devices that make up the Internet of Things (IoT) can pose a serious processing challenge for businesses that rely on traditional intelligence and analytics tools. An emerging solution is to use Artificial Intelligence (AI) and machine learning to build intelligent systems that automatically gather, process, and extract actionable insights from IoT data - in real time without the need for human intervention. How are AI-enabled systems transforming IoT devices and applications at the edge, and what are some of the emerging use cases we can expect to see in the near future?

Read More
news image

The Disruptions of 5G on Data-driven Technologies and Applications

whitePaper | December 18, 2019

With 5G on the verge of being adopted as the next mobile network, there is a need to analyze its impact on the landscape of computing and data management. In this paper, we analyze the impact of 5G on both traditional and emerging technologies and project our view on future research challenges and opportunities. With a predicted increase of 10-100x in bandwidth and 5-10x decrease in latency, 5G is expected to be the main enabler for smart cities, smart IoT and efficient healthcare, where machine learning is conducted at the edge.

Read More
news image

The Future of Smart Systems and IoT Analytics

whitePaper | January 30, 2020

The Internet of Things (IoT) and the new world of Smart Systems are ushering in an era where people, machines, devices, sensors, and businesses are all connected and able to interact with one another. The convergence of networked computing and large-scale data management with real time machine intelligence is driving the integration of the physical and virtual worlds and creating unimagined business opportunities.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More

Spotlight

Telesoft Technologies Ltd

Telesoft Technologies is a proven and trusted global provider of government infrastructure, cyber security and telecoms mobile products and services. We work with integrators and Service Providers to develop, manufacture and support systems that generate revenue, keep critical infrastructure operational and important data safe on legacy high density TDM, optical SONET/SDH and latest technology multi 100Gbps networks.

Events