Codenomicon Releases DEFENSICS 11.1 With ISAsecure Compliance Package And Industrial Load Tester
Provides testing and reporting with capabilities that conform to ISASecure's Embedded Device Security Assurance (EDSA) Communications Robustness Testing (CRT) requirements
November 11, 2013
PRESS RELEASE
Codenomicon, a world leader in software to find and fix security vulnerabilities in industrial control systems, today introduced the latest version of the market-leading DEFENSICS testing platform. Codenomicon DEFENSICS 11.1 provides testing and reporting with capabilities that conform to ISASecure's Embedded Device Security Assurance (EDSA) Communications Robustness Testing (CRT) requirements. The ISA Security Compliance Institute (ISCI), which administers the ISASecure compliance certification, is in the final stages of approving Codenomicon DEFENSICS 11.1 as a Recognized Test Platform for the CRT portion of ISASecure's EDSA cyber security certification. Codenomicon DEFENSICS provides complete coverage for the rigors of ISASecure EDSA testing. As part of the ISASecure testing package, Codenomicon is releasing a new DEFENSICS Industrial Control Systems (ICS) load tester. The Codenomicon DEFENSICS ICS Load Tester is now available to all Codenomicon customers at no additional charge.
For more information, contact:
(In U.S.A.) Mike Ahmadi, CISSP, Global Director, Medical Security, Codenomicon Ltd.
mike[at]codenomicon.com
(In Finland) Antti Kiiveri, Head of Marketing, Codenomicon Oy
kiiveri[at]codenomicon.com
About Codenomicon
Codenomicon's market-leading DEFENSICS software finds known and previously-unknown security vulnerabilities in software, firmware, and hardware. Codenomicon's customers include the US FDA, AT&T, Verizon, Comcast, Roche, Cisco, and Microsoft. Industry regulators, manufacturers, supply chain components companies, software and firmware developers, and end-user enterprises rely on Codenomicon's solutions to discover zero-day vulnerabilities and Common Vulnerabilities and Exposures (CVE®) that cause Denial of Service (DoS) and data leakage, which are the unknown vulnerabilities Advanced Persistent Threats (APTs) use to break into systems. For more information, go to www.codenomicon.com or contact [email protected]
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024