Synopsys has partnered with UL in establishing robust security requirements in embedded technologies. Synopsys has enabled UL with tools and top-level technology to establish the Cybersecurity Assurance Program (CAP).
Synopsys provides advanced solutions for improving the quality and security of software. Our comprehensive platform of automated analysis and testing technologies integrates seamlessly into the software development process and enables organizations to detect and remediate quality defects, security vulnerabilities, and compliance issues early in the software development life cycle, as well as to gain security assurance with and visibility into their software supply chain.
Coverity static analysis scans all source code that is made available to the laboratory by the product vendor, to look for software weaknesses .Download the datasheet
Defensics tests all external interfaces and communication protocols of the product.Download the datasheet
Take advantage of Black Duck to perform discovery and manage solutions.Download the datasheet
Our skilled testers can help you meet the testing criteria defined in UL 2900-2-1.
Use our services to perform safety-related security risk management in your supply chain.
Our Professional Services team can assist with quality management development and review as related to IEC 62304 and ISO 13485.
UL 2900-1 provides a framework to ensure risks from known vulnerabilities and malware have been addressed through structured penetration testing, evaluation of product source code, and analysis of a software bill of materials (SBOM). This framework provides manufacturers and developers a way to improve and demonstrate the safety of network-connected products and accessories.
UL 2900-2-1 presents additional requirements for network-connected devices suitable for use in healthcare environments. This level of testing increases the rigor of the traditional testing methods presented in UL 2900-1 and adds risk-based modeling to ensure devices are resilient to cyber attack. This level of certification also requires a cyber security life cycle security program to ensure future threats are mitigated.