Skip to main content
NewsNews&Events

News|iSTART-TEK Successfully Achieves ISO/IEC 27001:2022 Information Security Management System Certification

By May 22, 2025No Comments

iSTART-TEK, a company specializing in EDA tools and IP solutions for memory test and repair, as well as cloud-based service platforms, iSTART-Cloud, has recently achieved ISO/IEC 27001:2022 certification for its Information Security Management System from the internationally recognized certification body, AFNOR International.

iSTART-TEK’s cloud-based EDA service platform, iSTART-Cloud, imposes stringent requirements for information security management. To ensure the security of its member website, in addition to password login, biometric authentication via an app is required. This enhances the security of the member site. Furthermore, through VPN configuration, users can connect from their browser to a secure cloud desktop environment, effectively protecting data from cyberattacks or theft. Regarding file transfer, users can upload files to the cloud and download them locally after the MBIST circuit is completed. This eliminates the need for installation and environment variable setup, providing users with a more flexible and streamlined experience.

ISO/IEC 27001:2022 is a globally recognized standard for information security management, covering critical areas such as risk assessment, access control, data protection, and continuous improvement. By systematically implementing this standard, iSTART-TEK has significantly enhanced its information security policies and management framework, ensuring the confidentiality, integrity, and availability of customer data and business information—thereby effectively safeguarding data security and privacy.

Achieving the ISO/IEC 27001:2022 certification is a strong proof of iSTART-TEK’s capabilities in information security management. It also demonstrates the company’s commitment to meeting the expectations of customers, partners, and regulatory bodies. With this certification, iSTART-TEK ensures that its information security management systems are robustly enforced and monitored, effectively protecting digital assets from risks such as external threats or internal mismanagement that could lead to data loss, damage, or leakage.