Skip to searchSkip to main content
  • The Internet of Things

    The Internet of Things (IoT) has revolutionized how we interact with technology, seamlessly integrating connectivity into our daily lives. 

Industries Internet of Things
IoT security expertise
Consumer Products
Automotive
MedTech
Industrial
IoT security expertise

Brightsight provides rigorous security evaluation services against established industry standards. We deliver comprehensive security evaluation reports that meticulously document the compliance status of your IoT device, clearly indicating whether all required criteria are met. Our evaluations provide a factual, objective assessment, allowing manufacturers to understand precisely where their products stand in relation to recognized security benchmarks. Reports are sent to the relevant scheme or certification body for final certification.

Digital trust in our hyper connected world

From smart home devices and connected vehicles to critical medical equipment and industrial control systems, IoT's potential is vast. However, this interconnectedness also introduces significant security risks. As the number of connected devices proliferates, so does the potential for cyberattacks, data breaches, and system vulnerabilities that can compromise user safety, privacy, and operational integrity. 

Security evaluation is paramount in mitigating these risks

By rigorously testing and analyzing IoT devices, manufacturers can identify and address potential weaknesses before they are exploited. This proactive approach not only safeguards consumers and businesses but also builds trust in the burgeoning IoT ecosystem.

Brightsight, a leading security evaluation lab, empowers the IoT industry to navigate these security challenges. 

  • We specialize in providing comprehensive security evaluation services for a diverse range of IoT sectors, including consumer electronics, automotive, MedTech, and industrial applications. 
  • Our expertise enables us to assess the security posture of IoT devices against industry standards and regulatory requirements.

By partnering with Brightsight, manufacturers obtain clear, verifiable evidence of their product's security posture, facilitating the necessary steps for certification and market entry.

Consumer Products

Product security evaluation services for IoT consumer products

As the world becomes increasingly interconnected, the number of consumer IoT devices continues to surge. In 2024, there were over 1.3 billion active consumer IoT connections in Europe alone, with projections expecting 3 billion by 2030. This rapid growth, however, brings new security challenges—hackers exploit vulnerabilities in everything from smart home devices to wearables and connected appliances. 

Why IoT security matters

Consumer IoT devices interact with personal data, financial transactions, and even critical infrastructure. A lack of proper cybersecurity measures can lead to data breaches, identity theft, and unauthorized access to smart systems. Governments worldwide are responding with strict regulations to enforce higher cybersecurity standards for connected devices. 

Navigating global cybersecurity regulations

New cybersecurity laws are making compliance mandatory: 

EU Radio Equipment Directive (RED) – Requires IoT products to ensure network security, data protection, and fraud prevention (effective August 2025)
EU Cyber Resilience Act (CRA) – Establishes strict cybersecurity requirements for all digital products (effective 2024, fully enforced in 2027).
UK PSTI Act – Enforces security standards for consumer IoT devices starting April 2024.
US Cyber Trust Mark – A voluntary labeling scheme to help consumers identify secure IoT products.

How Brightsight helps you

Our independent testing laboratory specializes in evaluating and certifying consumer IoT devices for cybersecurity compliance. We help manufacturers and developers meet stringent global security requirements through: 
  • Pre-evaluation – Workshops, design reviews, and pre-assessments to identify vulnerabilities early. 
  • Security testing – Compliance assessments for ETSI EN 303 645RED Article 3.3 (EN 18031)NIST IR 8259A, and other global standards. 
  • Certification – Achieve the SGS Cybersecurity Mark, proving your product’s security and compliance. 
  • Continuous monitoring – post-certification support to ensure your device remains secure over time. 

Gain a competitive edge

With cybersecurity regulations evolving, manufacturers who prioritize security will stand out.

Secure and compliant devices means: 
Faster market entry – Meet legal requirements before regulations take full effect.
Consumer trust – Show users that your product is safe and privacy-conscious.
Reduced risk – Minimize the chances of cyberattacks and regulatory penalties.

IoT standards and recognitions

NIST 8259a;
NIST 8425
EN 303 645
TS 103 701
SB-327
European Radio Equipment Directive (RED)
Automotive

Product security evaluation services for the automotive industry

The rise of Autonomous Vehicles (AVs) and Connected Cars (CCs) is bringing new challenges to the automotive industry. Cutting-edge technologies such as artificial intelligence and machine learning, computer vision, high connectivity, cloud computing, complex OS, IoT and cybersecurity are merging into what will become a new industry paradigm. The applications of vehicle-connecting capabilities such as Vehicle-to-Everything (V2X) technology seem endless. 

Security evaluations in the automotive industry

The automotive market still lacks specific security assessment frameworks. Until very recently, systems and methodologies in this domain were driven by safety alone. While safety and security are closely related, safety is driven by likelihood and statistics, whereas security is driven by the potential of particular attack scenarios. 

Security evaluations can be applied to the different trust domains in the automotive market. This is a way to identify the product’s security functionality and its strength, giving full visibility to the rest of the trust domain regarding compliance with the security requirements in that particular domain. Security evaluation can take different shapes depending on the trust domain. For in-car systems, typical scenarios are working on the CAN bus performing remote attacks on CAN transceivers or performing fuzzing operations on CAN bus lines and other accessible transmission and input lines. 

Certification programs

Security evaluations can be conducted using Common Criteria and SESIP-based methodologies to demonstrate readiness for or compliance with:

  • GDPR
  • J3061
  • ISO 21434
  • UNECE WP.29
  • C2C V2X
  • C-ITS 

The duration of an automotive IoT security evaluation depends on the complexity of the vehicle's systems and the scope of the assessment. Factors like the number of ECUs, the complexity of the communication networks, and the availability of test vehicles influence the timeline. 

Brightsight offers comprehensive automotive IoT security evaluation services. We assess vehicle systems against relevant industry standards and best practices, including ISO/SAE 21434, and provide detailed vulnerability analyses and penetration testing.

Brightsight helps by providing independent, expert evaluations that identify security vulnerabilities and provide actionable recommendations for remediation. We offer in-depth analysis and reporting, giving manufacturers the confidence to deploy secure connected vehicles.

Automotive standards and recognitions

Common Criteria

C2C V2X

UNECE
WP.29
UN R155
UN R156
ISO 26262
ISO/SAE 21434
NIST
FIPS 140-2
FIPS 140-3
MedTech

Security evaluation services for medical devices

With the rising frequency and sophistication of cyberattacks, medical device regulations are increasingly mandating stricter security measures. Meeting these security requirements in the realm of medical technologies (MedTech) presents challenges, particularly when it comes to navigating the complex array of standards and regulations that must be followed.

Overcome obstacles

The first obstacle for medical device manufactures is the integration of cybersecurity into the existing processes and the harmonization of the security requirements to safety. The goal of cybersecurity regulations and guidance for medical devices is always the safety for the patient from physical and privacy-related harms. Thus, the motto “no safety without security”.

Cybersecurity requirements shall be included from the early phases of the product life cycle, guaranteeing “secure by design” products, to the legacy of the medical product. The long life cycle is yet another challenge, where manufacturers shall consider security solutions even after the support for the medical device is no more provided.

The consideration of the operating environment is an additional challenge. The complexity of the medical solutions, emergency situations and the distributed point of care, outside of managed and controlled networks, are critical aspects that shall be kept in consideration during the design phase of the medical device.

In addition, the medical device manufacturer shall ensure an appropriate level of the independence between the developing and testing groups, which requires additional technical experts and budget, which could be demanding for small to medium companies to sustain.

How Brightsight can support

We offer comprehensive training, testing, evaluation and certification services to support medical device manufacturers in the supply of safe and secure products. Our portfolio encompasses the pre-market phases of the product life cycle.

Training and workshops

  • Comparison of security regulations and standards
  • Secure Product Life Cycle 
  • Security Risk Management Process
  • Threat modelling and risk assessment
  • Secure coding practices 
  • Testing activities

Technical documentation review

  • Threat modelling and risk assessment review
  • Conformance check against IEC 81001-5-1 and IEC TR 60601-4-5

Cybersecurity testing

  • Vulnerability scans, penetration testing, source code review, etc.
  • Pre-evaluation testing on specific components of the full product 
  • Focused testing upon customer requests
  • Full testing campaigns

All our services take into consideration the requirements coming from different regulatory guidance (e.g. FDA, MDR, NMPA, …) and standards (IEC TR 60601-4-5 and IEC 81001-5-1).  In this way, our reports can be summited to different notification bodies and agencies.

Even if the current landscape for medical device cybersecurity testing lacks clear requirements and testing procedures, Brightsight recognizes the importance of cybersecurity certification. For this reason, it endorses cybersecurity certifications like SESIP, DTSec and Cybersecurity Labelling Scheme (Medical Devices), which provide a well-defined evaluation procedure and security assurance of the evaluated product. 

Length of evaluation or certification process

Training activities can be planned by the customer among the above-mentioned modules. They typically consist of one day training, subdivided into several sessions 2/3 hours each among several days.

Depending on the type of product and the complexity of the solution, a Technical Documentation Review is typically a 2-days workshop activity, where Brightsight experts will get through with the developer to the provided documentation and they will identify potential gaps and solutions on how to improve the security level of the product.

A full testing campaign lasts typically 3/6 weeks depending on the complexity of the product; the test plan is based on a defined scope, and it is characterized as a time-limited project. Tailored testing campaigns can be planned on specific functionalities, interfaces or any requested customer need. 

Two categories of cybersecurity testing

Black box testing

The evaluator is placed in the role of an external adversary with no internal knowledge of the target system. Evaluators are not provided with any architecture diagrams or source code that is not publicly available.

White box testing

Falls in the opposite end of the spectrum. Evaluators are given full access to source code, architecture documentation and so forth. The advantage of such an evaluation is a more in-depth analysis, without the need to decompile or reverse engineer the product. Therefore, a higher coverage in terms of discovering possible security weaknesses and security issues is possible.

It is up to the medical device manufacturer to select the type of cybersecurity testing. In Brightsight, the following procedure is used to clarify the project scoping with the customer:

Step 1: Qualification

Where the first contact aims to understand the customer request and the needs during an alignment with service offering.

Step 2: Scoping

Detailed technical questionnaires for the preparation of offering quotation are provided to the customer. The provided information will be then used to build a customized offer. 

Step 3: Offering

Alignment call(s) with the experts can be organized to discuss the project scope, deliverables and commitments acquired, as well the service cost.

We can test...

  • Implantable devices: pacemakers, insulin pumps
  • Diagnostic equipment (MRI machines, blood glucose monitors, patient monitors
  • Therapeutic devices: ventilators, Infusion pumps, robotic systems used to perform surgical procedures
  • Wearable devices: smart watches

  • Software as medical device
  • Desktop-based applications
  • Mobile-based applications
  • Web-applications
  • Network-based products
  • E2621

Medical standards and recognitions

AAMI TIR57
UL 2900
MDCG 2019-16
IEC TR 60601-4-5
ISA/IEC 62443
IEC 81001-5-1 ​
Industrial

Product security evaluation services for industrial IoT​

As the security landscape evolves rapidly, regulations are increasingly requiring proof of cybersecurity management in IoT, exemplified by the EU Radio Equipment Directive (RED) in 2025. The IoT sector is impacted by a range of legislation and standards, such as the NIS2 Directive, the EU Cyber Security Act, the EU Cyber Resilience Act, and NIST 8425 (USA).​ 

Obtaining certification against recognized industrial IoT standards, like ISA/IEC 62443, not only demonstrates effective cybersecurity management but also empowers developers to minimize risks in their value chain and distinguish their offerings in the marketplace.

Obtain certification, minimize risk and distinguish your offering in the marketplace

Attacks on critical infrastructure are real and security measures need to be taken into account in industrial networks. 

International standards offer a framework and common language for deploying and understanding security. Vendors can use their security evaluation to prove readiness for international standards, like 62443

Brightsight offers different services related to product security evaluation under certification programmes like SESIPPSA CertifiedCommon Criteria62443.

Guiding principles for implementing industrial security

  • Any regulation should refer to international standards and specifications.
  • Frameworks or issuing of quality/security labels.
  • International standards are the preferred means to demonstrate conformity with security requirements.

What is IEC 62443, IACS, IIoT?

IEC 62443 is the cybersecurity standard for Industrial Automation and Control Systems. Applicable to devices like IACS (Industrial Automation Control System), it is a global standard for industrial applications like Oil & Gas, Energy and Automotive. Asset owners, system integrators and device suppliers can differentiate their solutions via the IEC 62443 standards. These standards enable the entire ecosystem to work in a secure, integrated manner by certifying software, devices, processes and solutions.

Industrial standards and recognitions

NIST
FIPS 140-2
FIPS 140-3
ISA/IEC 62443

Get your IoT devices certified today

Partner with Brightsight to ensure your IoT products meet global security standards.