As technologies evolve and the world becomes more connected than ever before, cybersecurity becomes increasingly more important. That’s why we developed and published UL 2900-2-2, Standard for Software Cybersecurity for Network-Connectable Devices, Part 2-2: Particular Requirements for Industrial Control Systems.
Recently, the first certification under UL 2900-2-2 was issued to Electric Imp, a global IoT secure connectivity and application middleware platform provider. “The UL cybersecurity certification provides a purchaser confidence that the product has been thoroughly reviewed and tested to a trusted standard,” said Hugo Fiennes, Electric Imp CEO. “As industry standards and government regulations evolve, respected independent testing will remain the best means to help assure manufacturers and customers that they have done their due diligence to mitigate risk when using the IoT.”
By incorporating an IoT platform that is already UL certified with your products, you can leverage the UL Certified Software Implementation Solution by streamlining your product’s UL certification with less cost and faster time to market. By maximizing your security rigor with vendors that are already UL certified, you are minimizing supply chain risk and increasing trust in your brand. Find out which platforms are already UL certified by searching the UL Online Certifications Directory with the UL Category Code CYBR.
“UL 2900-2-2 testing criteria is for industrial control systems to assess software vulnerabilities and weaknesses, minimize exploitation, address known malware and review security controls,” said Rachna Stegall, director of connected technologies at UL.
To learn more about UL 2900-2-2 and the higher demand for helping secure the IoT, register for a live complimentary webinar hosted by Electric Imp on Tuesday, July 18 at 2:30PM EST. UL’s Rachna Stegall, Director of Connected Technologies, will join Electric Imp CEO, Hugo Fiennes to discuss “Why Security Certification is Crucial for IoT Success” in the fast-evolving world where real-time data exchange and security are becoming widely adopted.