Error 404

The requested page does not exist. Maybe it was deleted or moved. Please continue your visit on our homepage.
 

Perhaps you may find the information you are looking for on the following pages:

Smart Card Testing

https://cetecomadvanced.com/en/testing/smartcard/

Automotive Certification & Testing

https://cetecomadvanced.com/en/industries/automotive/

Accreditations & References

https://cetecomadvanced.com/en/about-us/accreditations-references/

Company

https://cetecomadvanced.com/en/about-us/

Over-the-Air (OTA) Testing

https://cetecomadvanced.com/en/testing/over-the-air-ota-testing/

Who we are

https://cetecomadvanced.com/en/career/who/

Environmental Simulation Tests

https://cetecomadvanced.com/en/testing/environmental-simulation/

cetecom advanced Germany, Essen

https://cetecomadvanced.com/en/locations/germany/

cetecom advanced GmbH, headquartered in Saarbruecken and Essen, Germany has more than 25 years of experience in testing and certifying products with radio technologies. In the beginning, the company’s focus was almost exclusively on testing mobile end devices. In the meantime, various products with and without radio technologies from a wide range of industries are […]

cetecom advanced Germany, Saarbruecken

https://cetecomadvanced.com/en/locations/germany-saarbruecken/

cetecom advanced GmbH, headquartered in Saarbruecken and Essen, Germany has more than 25 years of experience in testing and certifying products with radio technologies. In the beginning, the company’s focus was almost exclusively on testing mobile end devices. In the meantime, various products with and without radio technologies from a wide range of industries are […]

Recorded version – Webinar about cybersecurity options for devices with radio technologies

https://cetecomadvanced.com/en/seminars/webinar-about-cybersecurity/

Digital networking in particular makes applications and components of mobile or static IoT devices vulnerable to attacks. To access a networked device, three main targets are attacked: the device itself, the network and the infrastructure (app, cloud). However, the security of the networked environment, for example in industry, can prevent such external access or IoT […]