


{"id":14306,"date":"2023-10-03T08:37:00","date_gmt":"2023-10-03T08:37:00","guid":{"rendered":"https:\/\/www.qbictechnology.com\/?p=14306"},"modified":"2023-10-26T01:31:34","modified_gmt":"2023-10-26T01:31:34","slug":"the-qbic-security-design-policy","status":"publish","type":"post","link":"https:\/\/www.qbictechnology.com\/zh-tw\/news\/the-qbic-security-design-policy\/","title":{"rendered":"Introducing the Gold Standard: Qbic&#8217;s Security Design Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14306\" class=\"elementor elementor-14306\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-a3645f3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a3645f3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a230b1\" data-id=\"5a230b1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5776fa elementor-widget elementor-widget-text-editor\" data-id=\"c5776fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Navigating the intricacies of IPC and IoT, Qbic stands firmly with unparalleled expertise in design, development, and manufacturing. Our dedication is underpinned by a relentless pursuit of ensuring our partners and customers are equipped with nothing less than with products that epitomize security, reliability, and longevity.<\/p><p>The expanding terrain of IoT presents not just opportunities but challenges, notably in privacy and security domains. In recognition of this, we&#8217;ve channeled years of research, field insights, and real-world implementation experience into our <b>Qbic Security Design Policy<\/b>. Today, every phase of the Qbic product lifecycle\u2014design, development, production, and maintenance\u2014is governed by rigorous standards in three areas: Security Design, Security Architecture, and Security Services.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6ade3b elementor-widget elementor-widget-spacer\" data-id=\"a6ade3b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-043f47d elementor-widget elementor-widget-heading\" data-id=\"043f47d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Design<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef4df4 elementor-widget elementor-widget-text-editor\" data-id=\"1ef4df4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>From the drawing board to the final product, Qbic ensures security is the cornerstone of our devices. The Qbic Security Design Policy is integrated from a product&#8217;s inception, providing a solid foundation for strong protection, proactive defense, and swift updates.<\/p>\n<h4><span style=\"color: var(--the7-h4-color); letter-spacing: var(--the7-h4-letter-spacing); text-transform: var(--the7-h4-text-transform); word-spacing: var(--the7-h4-word-spacing); background-color: rgba(255, 255, 255, 0);\">Hardware Security<\/span><\/h4>\n<p>To us, hardware isn&#8217;t just a vessel for software\u2014it&#8217;s an integral component of our security strategy. Our engineering teams prioritize security in their designs, integrating tactile security components such as advanced anti-theft systems. Moreover, our electric circuit design is intricately woven with security principles, fortifying the defense capabilities of our products.<\/p>\n<h4>Code Review and Security Features Test<\/h4>\n<p>At Qbic, we uphold the highest standards in software development, mirroring the rigorous code review platform and processes synonymous with industry leaders like Google. Our commitment doesn&#8217;t stop at adhering to coding styles; we delve deeper. Every line of our software source code undergoes intensive security evaluations, ensuring vulnerabilities and potential weaknesses are identified and mitigated before any release.<\/p>\n<h4>Penetration\/Security Tests<\/h4>\n<p>Our dedication to superior security measures led us to collaborate with a top-tier third-party security lab as an integral part of the Qbic Security Design Policy. Onward Security, recognized as the Best Cybersecurity Company &#8211; Gold Winner by the Cyber Security Excellence Awards, provides both security certification and consultancy services, reinforcing our stance on delivering unmatched security for our partners and users.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b5f9ee elementor-widget elementor-widget-spacer\" data-id=\"3b5f9ee\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-224eb39 elementor-widget elementor-widget-heading\" data-id=\"224eb39\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Architecture<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d727126 elementor-widget elementor-widget-text-editor\" data-id=\"d727126\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the realm of device security, three critical elements stand out: the operating environment, information integrity, and access permissions. Their interplay is vital, and ensuring their collective protection is non-negotiable for us. Recognizing this intricate balance, Qbic is committed to engineering a suite of security features that guarantee optimal safety across operational, informational, and access parameters.<\/p><h4>Fortify+: Qbic&#8217;s Premier Security Suite<\/h4><p>Our approach to security isn&#8217;t one-dimensional. At Qbic, we&#8217;ve meticulously crafted and integrated a comprehensive set of nine significant fortifications, all packaged under our award-winning security solution, <a href=\"https:\/\/www.qbictechnology.com\/news\/introducing-qbic-fortify\/\">Qbic Fortify+<\/a>.\u00a0<\/p><p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">(Related Article: <a href=\"https:\/\/www.qbictechnology.com\/news\/qbic-fortify-wins-2023-fortress-cyber-security-award\/\">Qbic Fortify+ Wins 2023 Fortress Cyber Security Award<\/a><\/span>)<\/p><p>These fortifications are meticulously designed to shield devices from a myriad of security threats. With our hardware, firmware, and software receiving this robust protection, we aim to support our partners with improved security across operations, information, and access.<\/p><p>Devices that meet our rigorous security standards are given a mark of excellence &#8211; they are labeled &#8216;Qbic Fortify+&#8217;. This mark not only signifies advanced protection but is a testament to our unwavering commitment to high-security requirements.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d86aae elementor-widget elementor-widget-spacer\" data-id=\"7d86aae\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-101cb94 elementor-widget elementor-widget-image\" data-id=\"101cb94\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"763\" height=\"471\" src=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/08\/Qbic-Fortify.png\" class=\"attachment-large size-large wp-image-14317\" alt=\"Qbic Fortify+ and\" srcset=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/08\/Qbic-Fortify.png 763w, https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/08\/Qbic-Fortify-300x185.png 300w\" sizes=\"(max-width: 763px) 100vw, 763px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Qbic's award-winning security solution, Qbic Fortify+ and its nine major fortifications designed to keep your Qbic devices secure.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c89e1f elementor-widget elementor-widget-spacer\" data-id=\"6c89e1f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08a9fc1 elementor-widget elementor-widget-heading\" data-id=\"08a9fc1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-837c280 elementor-widget elementor-widget-text-editor\" data-id=\"837c280\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"background-color: rgba(255, 255, 255, 0);\">In the world of IPC and IoT technologies, different applications and user situations create a wide range of security needs.\u00a0<\/span><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">An IPC and IoT company of repute must be agile enough to address and satisfy these diverse security demands. This is where Qbic stands out.<\/span><\/p><h4>Tailored Security Solutions<\/h4><p>With a wealth of experience under our belt, Qbic excels at tailoring hardware, firmware, and software solutions to cater to unique needs. One of our proven strategies includes defaulting to limited connectivity, significantly reducing the potential exposure and susceptibility of a device to threats.<\/p><h4>Proactive Security Maintenance<\/h4><p>Our commitment to security doesn\u2019t conclude post-deployment. At Qbic, we recognize the importance of continual vigilance. Alongside our customization services, we offer robust security support. Our clients benefit from regular security patches and, importantly, any security-related issues are promptly addressed, with fixes being our topmost priority.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7480d13 elementor-widget elementor-widget-spacer\" data-id=\"7480d13\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ef6116 elementor-widget elementor-widget-heading\" data-id=\"4ef6116\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unyielding Commitment to Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e778cd2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e778cd2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today&#8217;s swiftly changing technological landscape, the emergence of hardware and software vulnerabilities is not a question of if, but when. This reality underscores the vital necessity for IPC and IoT organizations to maintain an unwavering commitment to ensuring their smart devices are secure.<\/p>\n<p>Qbic stands at the forefront of this mission. Our entire product life cycle, from conception to maintenance, is anchored by the Qbic Security Design Policy. This isn&#8217;t just a static policy; it&#8217;s a living framework, always in sync with the most recent breakthroughs in security.&nbsp;<\/p>\n<p>At Qbic, our relentless pursuit of excellence not only ensures unmatched security across our offerings but also provides peace of mind for our partners and customers. Together, we forge a secure and confident future.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Navigating the intricacies of IPC and IoT, Qbic stands firmly with unparalleled expertise in design, development, and manufacturing. Our dedication is underpinned by a relentless pursuit of ensuring our partners and customers are equipped with nothing less than with products that epitomize security, reliability, and longevity. The expanding terrain of IoT presents not just opportunities&hellip;<\/p>\n","protected":false},"author":6,"featured_media":14674,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-14306","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing the Gold Standard: Qbic&#039;s Security Design Policy - Qbic Technology<\/title>\n<meta name=\"description\" content=\"Secure your Qbic IoT devices against evolving cyber threats with our unwavering commitment. Explore how we deliver on this promise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the Gold Standard: Qbic&#039;s Security Design Policy - Qbic Technology\" \/>\n<meta property=\"og:description\" content=\"Secure your Qbic IoT devices against evolving cyber threats with our unwavering commitment. Explore how we deliver on this promise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Qbic Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/QbicTechnology\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-03T08:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-26T01:31:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Stephanie Chao\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/\"},\"author\":{\"name\":\"Stephanie Chao\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/person\/dac42556ed7566ed828d15c8c411d1b9\"},\"headline\":\"Introducing the Gold Standard: Qbic&#8217;s Security Design Policy\",\"datePublished\":\"2023-10-03T08:37:00+00:00\",\"dateModified\":\"2023-10-26T01:31:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/\"},\"wordCount\":829,\"publisher\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"tw\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/\",\"url\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/\",\"name\":\"Introducing the Gold Standard: Qbic's Security Design Policy - Qbic Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png\",\"datePublished\":\"2023-10-03T08:37:00+00:00\",\"dateModified\":\"2023-10-26T01:31:34+00:00\",\"description\":\"Secure your Qbic IoT devices against evolving cyber threats with our unwavering commitment. Explore how we deliver on this promise.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#breadcrumb\"},\"inLanguage\":\"tw\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tw\",\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#primaryimage\",\"url\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png\",\"contentUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png\",\"width\":1300,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.qbictechnology.com\/zh-tw\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing the Gold Standard: Qbic&#8217;s Security Design Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.qbictechnology.com\/#website\",\"url\":\"https:\/\/www.qbictechnology.com\/\",\"name\":\"Qbic Technology\",\"description\":\"Your Smarter Space\",\"publisher\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.qbictechnology.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tw\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.qbictechnology.com\/#organization\",\"name\":\"Qbic Technology Co., Ltd.\",\"url\":\"https:\/\/www.qbictechnology.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tw\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png\",\"contentUrl\":\"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png\",\"width\":1347,\"height\":566,\"caption\":\"Qbic Technology Co., Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/QbicTechnology\",\"https:\/\/www.linkedin.com\/company\/qbictechnology\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/person\/dac42556ed7566ed828d15c8c411d1b9\",\"name\":\"Stephanie Chao\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tw\",\"@id\":\"https:\/\/www.qbictechnology.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/45e7b1ec6cfe80b9c7e44b4af3189c2709b1251cf538a0c8d584e4f767a237af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/45e7b1ec6cfe80b9c7e44b4af3189c2709b1251cf538a0c8d584e4f767a237af?s=96&d=mm&r=g\",\"caption\":\"Stephanie Chao\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/stephanie-chao722\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing the Gold Standard: Qbic's Security Design Policy - Qbic Technology","description":"Secure your Qbic IoT devices against evolving cyber threats with our unwavering commitment. Explore how we deliver on this promise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/","og_locale":"en_US","og_type":"article","og_title":"Introducing the Gold Standard: Qbic's Security Design Policy - Qbic Technology","og_description":"Secure your Qbic IoT devices against evolving cyber threats with our unwavering commitment. Explore how we deliver on this promise.","og_url":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/","og_site_name":"Qbic Technology","article_publisher":"https:\/\/www.facebook.com\/QbicTechnology","article_published_time":"2023-10-03T08:37:00+00:00","article_modified_time":"2023-10-26T01:31:34+00:00","og_image":[{"width":1300,"height":1000,"url":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png","type":"image\/png"}],"author":"Stephanie Chao","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#article","isPartOf":{"@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/"},"author":{"name":"Stephanie Chao","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/person\/dac42556ed7566ed828d15c8c411d1b9"},"headline":"Introducing the Gold Standard: Qbic&#8217;s Security Design Policy","datePublished":"2023-10-03T08:37:00+00:00","dateModified":"2023-10-26T01:31:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/"},"wordCount":829,"publisher":{"@id":"https:\/\/www.qbictechnology.com\/#organization"},"image":{"@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png","articleSection":["News"],"inLanguage":"tw"},{"@type":"WebPage","@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/","url":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/","name":"Introducing the Gold Standard: Qbic's Security Design Policy - Qbic Technology","isPartOf":{"@id":"https:\/\/www.qbictechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#primaryimage"},"image":{"@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png","datePublished":"2023-10-03T08:37:00+00:00","dateModified":"2023-10-26T01:31:34+00:00","description":"Secure your Qbic IoT devices against evolving cyber threats with our unwavering commitment. Explore how we deliver on this promise.","breadcrumb":{"@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#breadcrumb"},"inLanguage":"tw","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/"]}]},{"@type":"ImageObject","inLanguage":"tw","@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#primaryimage","url":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png","contentUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2023\/10\/Qbic-Security-Lifecycle_wp-1.png","width":1300,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/www.qbictechnology.com\/news\/the-qbic-security-design-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.qbictechnology.com\/zh-tw\/"},{"@type":"ListItem","position":2,"name":"Introducing the Gold Standard: Qbic&#8217;s Security Design Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.qbictechnology.com\/#website","url":"https:\/\/www.qbictechnology.com\/","name":"Qbic Technology","description":"Your Smarter Space","publisher":{"@id":"https:\/\/www.qbictechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.qbictechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tw"},{"@type":"Organization","@id":"https:\/\/www.qbictechnology.com\/#organization","name":"Qbic Technology Co., Ltd.","url":"https:\/\/www.qbictechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"tw","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png","contentUrl":"https:\/\/www.qbictechnology.com\/wp-content\/uploads\/2022\/07\/Qbic-Logo-2021-e1671297962726.png","width":1347,"height":566,"caption":"Qbic Technology Co., Ltd."},"image":{"@id":"https:\/\/www.qbictechnology.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/QbicTechnology","https:\/\/www.linkedin.com\/company\/qbictechnology\/"]},{"@type":"Person","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/person\/dac42556ed7566ed828d15c8c411d1b9","name":"Stephanie Chao","image":{"@type":"ImageObject","inLanguage":"tw","@id":"https:\/\/www.qbictechnology.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/45e7b1ec6cfe80b9c7e44b4af3189c2709b1251cf538a0c8d584e4f767a237af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45e7b1ec6cfe80b9c7e44b4af3189c2709b1251cf538a0c8d584e4f767a237af?s=96&d=mm&r=g","caption":"Stephanie Chao"},"sameAs":["https:\/\/www.linkedin.com\/in\/stephanie-chao722\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/posts\/14306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/comments?post=14306"}],"version-history":[{"count":36,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/posts\/14306\/revisions"}],"predecessor-version":[{"id":14480,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/posts\/14306\/revisions\/14480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/media\/14674"}],"wp:attachment":[{"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/media?parent=14306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/categories?post=14306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qbictechnology.com\/zh-tw\/wp-json\/wp\/v2\/tags?post=14306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}