Codenomicon Releases DEFENSICS 11.1 With ISAsecure Compliance Package And Industrial Load Tester

Provides testing and reporting with capabilities that conform to ISASecure's Embedded Device Security Assurance (EDSA) Communications Robustness Testing (CRT) requirements

November 11, 2013

1 Min Read

PRESS RELEASE

Codenomicon, a world leader in software to find and fix security vulnerabilities in industrial control systems, today introduced the latest version of the market-leading DEFENSICS testing platform. Codenomicon DEFENSICS 11.1 provides testing and reporting with capabilities that conform to ISASecure's Embedded Device Security Assurance (EDSA) Communications Robustness Testing (CRT) requirements. The ISA Security Compliance Institute (ISCI), which administers the ISASecure compliance certification, is in the final stages of approving Codenomicon DEFENSICS 11.1 as a Recognized Test Platform for the CRT portion of ISASecure's EDSA cyber security certification. Codenomicon DEFENSICS provides complete coverage for the rigors of ISASecure EDSA testing. As part of the ISASecure testing package, Codenomicon is releasing a new DEFENSICS Industrial Control Systems (ICS) load tester. The Codenomicon DEFENSICS ICS Load Tester is now available to all Codenomicon customers at no additional charge.

For more information, contact:

(In U.S.A.) Mike Ahmadi, CISSP, Global Director, Medical Security, Codenomicon Ltd.

mike[at]codenomicon.com

(In Finland) Antti Kiiveri, Head of Marketing, Codenomicon Oy

kiiveri[at]codenomicon.com

About Codenomicon

Codenomicon's market-leading DEFENSICS software finds known and previously-unknown security vulnerabilities in software, firmware, and hardware. Codenomicon's customers include the US FDA, AT&T, Verizon, Comcast, Roche, Cisco, and Microsoft. Industry regulators, manufacturers, supply chain components companies, software and firmware developers, and end-user enterprises rely on Codenomicon's solutions to discover zero-day vulnerabilities and Common Vulnerabilities and Exposures (CVE®) that cause Denial of Service (DoS) and data leakage, which are the unknown vulnerabilities Advanced Persistent Threats (APTs) use to break into systems. For more information, go to www.codenomicon.com or contact [email protected]

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights