Product Certification

Overview

We thought what is the use of having years of knowledge base and experience base in the cyber security domain unless we extend it to certify products. Lately many hardware and software vendors are coming up with their out-of-the-box products.

Some Facts

Web Attacks / Total Attacks - 58%
IP Attacks / Total Attacks - 42%
Internal Attacks / Total Attacks - 78%
External Attacks / Total Attacks - 28%

Product's Security Certification


We thought what is the use of having years of knowledge base and experience base in the cyber security domain unless we extend it to certify products. Lately many hardware and software vendors are coming up with their out-of-the-box products. When they take those to their customers, they are often asked about the security of that product from two important perspectives.

  • Data At Rest

  • Data In Transit

This is a very valid and crucial awareness among the customers because they are caring about their data, as well as that of their customers or associate companies. We at Valency Networks, provide Product's Security Certification or Endorsement as a service and cater to the following product verticals and few examples of each.


Web Products

  • Web Portals storing data

  • E-Commerce websites

  • Payment Gateway Solutions


Client/Server Products

  • Desktop apps using database

  • Localized Non-Web software

Mobile App Products

  • Apps storing sensitive data

  • Apps calling web services

  • Android / iOS platforms


Cloud Products

  • CRM software

  • Online ERP solutions

Network Appliances/Devices

  • Firewalls (Layer -2 / 3 / 7) / UTMs

  • Routers / Switches (Layer -2/3)

  • Intrusion Prevention Devices

  • Antivirus / Antimalware appliances

What exactly do we do?

Its simple. We take the product from you under a consent to perform dissection or a brute force operation. We also study the product architecture and map it with various potential security problems that can arise due to incorrect or in-adequate security design practices. We also do bit of reverse engineering to see if any part of code or product functionality can be exploited in future. All this is performed using industry standard tools which capture tons of logs.

Valency Networks' technical team uses their years of experience to go through the logs, find vulnerabilities and perform further analysis. Further to that, customer gets a detailed report of problems and mitigation/resolution solutions. Once the customer fixes all bugs and problems, we perform another round of testing to ascertain that the problems are indeed fixed. Upon such a verification, we provide a certificate of endorsement for that product make/model/version or the software build.

What do you get?



We provide you with a certificate of endorsement which displays your firm's name and the product being endorsed. We also categorically mention various security areas for which the product passed the testing. The report also contains a link to a web page on Valency Networks' website, which your customer can visit and know about all the tests and industry standard methods used to perform the testing.
Please click here to see a sample certificate copy.

Cyber Security Services :

FEATURES

PROCESS

BENEFIT

FAQ

RELATED LINKS

What Our Customers Say?

Valency Networks is a very techie company, focusing on a continuous improvement in service quality. Our customers like us exactly for that and that helps us keep our quality to the best extent.