Skip to main content

Tattile gains double cybersecurity certification

IEC-62443 and ISO-27001 cover software and infrastructure IT security
By Adam Hill January 25, 2024 Read time: 2 mins
Tattile: certified

Tattile has achieved two key cybersecurity certifications for its products: IEC-62443 (focused on software security) and ISO-27001 (infrastructure IT security).

The Italian company, which specialises in cameras for ITS applications, warns that security bugs are growing, and cites research from Cybersecurity Ventures that the global annual cost of cybercrime is estimated to exceed $20 trillion by 2026.

ANPR cameras are not exempt from cyberattacks for several reasons, the manufacturer says: "Being placed in public areas, they could be approached by ill-intentioned people. Working inside the interconnection of networks, cameras can be part of larger systems and interconnected with other devices and systems."

Cameras may be vulnerable to unknown threats if they don't receive regular updates from the manufacturer or users due to software and firmware vulnerabilities, Tattile adds.

The company developed its Stark software platform from scratch, using the DevSecOps methodology and says it planned from the start to achieve the double cybersecurity certification.

IEC-62443 been established by several global testing, inspection and certification bodies, defining elements such as test methods, surveillance audit policies and public documentation policies. 

Tattile says the DevSecOps methodology reduces risk via dedicated tools that continuously analyse all the code bases, and ensures products are secure by design.

Also, as new cyberattacks continue to emerge, security patches and related software updates need to be applied to the system: Stark by Tattile provides "at least 12 annual updates", the company says.

Meanwhile, ISO/IEC-27001:2013 (ISO-27001) ensures that the processing of information (including data provided by customers) is compliant with international standards such as GDPR.

For more information on companies in this article

Related Content

  • Michigan fosters real-world testing of workzone ITS
    September 19, 2017
    Turning a ‘problem’ into ‘an opportunity’ is the mantra of just about every business book and Michigan Department of Transportation (MDoT) looks set to achieve that aim in Oakland County, where 29km (18 miles) of the I-75 needs to be reconstructed. Running north-northwest from Detroit, the I-75 carries around 170,000 vehicles per day but, being built in the 1970s, it now requires an additional lane in each direction and upgrading to the latest design and safety standards. Upgrading will be carried out in
  • Birmingham CAZ is green for go
    July 26, 2021
    For urban authorities worldwide, the health of residents is racing up the political agenda. Ben Spencer looks at how one city - Birmingham, UK - has established its own Clean Air Zone and is investing in alternative-fuel vehicles and public transport incentives
  • Do satellites provide a heavenly view of tolling’s future?
    December 16, 2014
    Satellite-based tolling opens up new options for authorities and can be integrated with DSRC systems as David Crawford discovers. As the proud custodian of the European Union (EU)’s longest road network covered by a single (truck) charging scheme – and the only one to include all major roads - Slovakia has become the continent’s poster-nation for the virtues of GNSS/CN (Global Navigation Satellite System/Cellular Network)-based tolling. It is also proved to be a very fast implementer. Speaking at the 2014 I
  • Automotive industry releases vehicle cybersecurity best practices
    July 22, 2016
    Members of the US Automotive Information Sharing and Analysis Center (Auto-ISAC) have released an overview of comprehensive Automotive Cybersecurity Best Practices, developed as a proactive measure to further enhance vehicle cybersecurity throughout the industry. The Executive Summary has been released publicly on the Auto-ISAC website. The Best Practices provide guidance to assist an organisation's development in seven key topic areas, including governance, risk assessment and management, threat de