Skip to main content

Field Monitoring

Protect your connected devices in the field with firmware monitoring

Login or register Request a demo

Strengthen Consistent Security throughout Your Connected Product Lines

In the operational phase, firmware vulnerability monitoring can help connected device stakeholders prevent attacks and maintain their device’s security posture by tracking and remediating vulnerabilities as they come.

 

Challenges for connected device stakeholders

Connected devices stakeholders face increasingly sophisticated cybersecurity challenges in today’s highly connected world. Some of their key issues include:

  • Clarity on the company’s standing in terms of product security practices.
  • Knowing whether product development processes are in line with industry-specific standards.
  • Identifying actions to take in terms of process improvements, security techniques and mechanisms.
  • Understanding whether the connected device infrastructure is developed, deployed and operated securely.
  • Knowing what they should focus on to get to the proper security maturity.

 

 

Monitor your firmware security, help ensure continuous compliance with Field Monitoring.

What is Field Monitoring?

Field Monitoring is for product security and development teams at device manufacturers, suppliers or system integrators releasing connected products in the market and looking to help ensure continuous security by monitoring vulnerabilities and addressing them as they emerge. The solution is applicable to the automotive, healthcare, manufacturing and consumer IoT industries.

Field Monitoring is a solution allowing device manufacturers, suppliers and system integrators developing firmware to perform a security check on a firmware in the field, providing a report with elements of their choosing:

  • Software Composition Analysis (SCA) and Software Bill of Materials (SBOM)
  • Known Vulnerabilities (CVEs)
  • Unknown vulnerabilities (zero-day vulnerabilities)
  • Compliance analysis with several supported standards and guidelines including UL’s IoT Security Rating, ETSI 303 645, ISO 21434, IEC 62443-4-1, IEC 62443-4-2, and more.

How it works

UL’s Field Monitoring solution offers three service plans for your selection, with the option to purchase one scan, four scans or 12 scans based on your needs.

 

Standard Pro Premium
  • Software Composition Analysis (SCA) and Software Bill of Materials (SBOM)
  • Known Vulnerabilities (CVEs)
  • Software Composition Analysis (SCA) and Software Bill of Materials (SBOM)
  • Known Vulnerabilities (CVEs)
  • Zero-day Vulnerabilities or compliance Analysis
  • Software Composition Analysis (SCA) and Software Bill of Materials (SBOM)
  • Known Vulnerabilities (CVEs)
  • Zero-day Vulnerabilities
  • Compliance Analysis

 

Product Security and development teams can self-register on the SafeCyberTM platform and choose a plan with features based on their needs

User icon

1.

Create an account here.

Shield lock icon

2.

Start a Field Monitoring project on the application and choose a number of firmware scans:

• One firmware scan
• Four firmware scans
• 12 firmware scans
Upload cloud icon

3.

Upload the provided order form with your chosen features and the firmware binary file(s) to scan.

Document certificate icon

4.

Upon processing the order, receive your report.

Self assessment icon

5.

Define actions for the latest vulnerability report received through the application.

 

Industry-specific Standards supported

Industry  Standard Description
Automotive ISO 21434 Standard for automotive devices and components
Industrial IEC 62443-4-1
IEC62443-4-2
Standards for industrial devices and components
IoT IoT Security Rating (ETSI 303 645 compatible) Standards for connected home devices and components

And more

 

 

Customer Benefits

 

Firmware update icon

Detect known and unknown vulnerabilities for your device firmware implementations in the field for faster remediation.

Technical report icon

Obtain a continuous compliance analysis on industry-leading standards, including ETSI 303 645, ISO 21434

Laptop report icon

Easily generate a software bill of materials.

Hand shield icon

Gain clarity on where you stand and what you need to remediate to prevent attacks.

 

Download a Field Monitoring fact sheet

Field Monitoring is a solution empowering device manufacturers, suppliers and system integrators developing firmware to perform a security check on firmware in the field.

Download fact sheet

Have more questions about Firmware Check? Explore our Technical Guide and FAQs.

Get in touch

Have questions, need specifics? Let's get this conversation started.

Help and support

How can we help?