Products + All Products + Software Integrity + Semiconductor IP + Verification + Design + Silicon Engineering
Every CVA consists of an end-to-end security evaluation, which includes:
Protecting the electronic security perimeter created by the Smart Grid requires an understanding of your utility’s threat model and the critical assets protected by your electronic security perimeter. Traditional network security does not cover the security of the software components within all new Smart Grid technologies. Our vast experience in both network and software security can help your organization comprehensively evaluate your security posture. This examination involves evaluating risks across multiple layers, from software running on embedded devices to the physical security controls in place. Your people, process, and technology controls are systematically evaluated against the risks they face from your adversaries.