Wireless Technology in Medical Devices
Performance, security and privacy solutions for medical devices
EMC Testing for Wireless Technology Contained in Medical Devices
Many portable medical devices incorporate wireless technology which may present risks for life-supporting equipment and other applications. To ensure compliance and prevent interference, you must validate your device to electromagnetic compatibility (EMC) standards. Intertek has the facilities and expertise to help you identify and understand the regulatory requirements applicable to your device, while managing your overall testing to these standards and more:
- FCC Part 15
- FCC Part 18
- Industry Canada: ICES-001
- Industry Canada: Radio Standards Specifications (RSS)
Software Applications and Devices
Software testing and testing of applications and content for mobile devices and networks can becumbersome, due to global requirements, continuously evolving testing standards and the growing number of handsets and devices. We offer testing scalability and a set of flexible andmobile-oriented Quality Assurance (QA) services designed to shorten your product’s time to market.
- Device compatibility testing
- Customized testing strategies
- QA and management tools
- The industry’s largest handset inventory
- Access to all major mobile platforms
- Advisory Expertise
Our 6-Point Security Check
With Intertek's expertise and experience in developing and guiding software and device security, you will be provided the information you need and the confidence you deserve when developing new software and devices. Our 6-Point Check consists of:
1. Scan according to OWASP Recommendations
We use custom and off-the-shelf automated tools that scan web applications to look for known security vulnerabilities such as cross-site scripting, SQL injection, command execution, directory transversal, and insecure server configuration.
2. Review Web Services configuration
We will review and identify the operations of your web service and provide feedback on any vulnerabilities or misconfigurations we find using automated and manual test methods.
3. Review Data Security Logs
During our testing we will work with your team to review and evaluate security logs generated during our tests and provide actionable information on any identified security gaps.
4. Discover potential SQL Injection points
We will identify how your web application works with your database and construct a series of automated and manual simulated scenarios to help identify any potential exploit paths.
5. Validate Security Controls
We will review and verify current security protocols and provide feedback on the current implementation and provide guidance for updated security measures if needed.
6. Recommend remediation steps
Following our tests, we will provide up to three hours of consultation to discuss and train on our findings and potential remediation techniques.
Intertek does not provide consulting services for management systems certification. Any consulting activities provided by Intertek are separate and independent from certification activities.