Our cyber security certificate is an independent proof of quality for the security of IT-based products. It serves as an important differentiating factor for both suppliers and buyers when selecting or commissioning IT products. For manufacturers, the security certificate is a marketing support with which they can prove compliance with the protection requirements of their customers. A certificate shows buyers that the product meets quality criteria and that the manufacturer attaches great importance to the security of its products.
Fraunhofer SIT, as an independent body, checks both the design and the practical implementation of the product and, if all requirements are met, issues a certificate. The reputation of the Security Test Lab of Fraunhofer SIT and our independence are important factors in fulfilling the expectations of a reliable evidence of IT security quality.
The certification includes a detailed assessment report, the certificate outlining the substantiated security requirements, an entry in our list of certificates on this website and, on request, a white paper version of the assessment report describing the IT security requirements of your product and the protective properties of your product for the general public.
Please contact us for further information on the Certificate.
Accu-Chek® Solo micropump system consisting of Accu-Chek® Solo micropump FW V1-11, Accu-Chek® Aviva/Performa Solo diabetes manager FW V13.72, BGM FW V3.01, RFI FW V12.17 and Accu-Chek® Guide Solo diabetes manager FW V1.18, BGM FW V3.2.0, RFI FW V20.07
Accu-Chek® Insight Diabetes Therapy System consisting of Accu-Chek Insight insulin pump: V2.00.004 – V3.00.17 and Accu-Chek Aviva/Performa Insight diabetes manager: UI FW 7.10, RF1 FW 0.3
Accu-Chek® Solo micropump system consisting of Accu-Chek® Solo micropump FW V1-11 and Accu-Chek® Aviva/Performa Solo diabetes manager FW V13.72, BGM FW V3.01, RFI FW V12.17
In order to take account of new developments, our certificates usually expire after two years. We extend expired certificates after successful re-examination, in which we take into account minor changes to the test object as part of product maintenance, as well as new scientific findings, for example on the security of cryptographic algorithms used.