Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Artistic representation of Bishop Fox cybersecurity professionals conducting penetration testing and security assessment services using reference to the hacker culture.
Vendor Assessment

Amazon Alexa Security Assessment

Authorized Security Lab

Black on white artistic representation of a penetration testing engagement using a section of a robotic looking machine with an organic human feel.

Bishop Fox is an Authorized Security Lab providing independent security assessments to help developers meet the security requirements for Alexa Built-in devices using Amazon Voice Service (AVS).

 .d8888b.   d888
d88P  Y88b d8888
888    888   888
888    888   888
888    888   888
888    888   888
Y88b  d88P   888
 "Y8888P"  8888888

DELIVERING THE HIGHEST QUALITY EXTERNAL SECURITY ASSESSMENT FOR YOUR DEVICE.

Alexa is Amazon’s cloud-based voice service available on more than 100 million devices from Amazon and third-party device manufacturers. With Alexa Voice Service (AVS), you can build natural voice experiences that offer customers a more intuitive way to interact with the technology they use every day. Amazon offers a collection of tools, APIs, reference solutions, and documentation to make it easier to build for Alexa.

As an Authorized Test Lab (ATL), we offer independent security assessments to help you meet the security requirements for Alexa Built-in devices. Testing your device with an authorized lab streamlines your path to certification and reduces development time. Learn more by visiting the AVS Developer portal.

Every ATL meets the requirements to follow the Alexa Built-in Testing and Certification Process and is compliant with ISO 17025 for testing and calibration laboratories.

Get started on your security assessment

By submitting this form, you indicate that you have read and agree to the terms of our Privacy Policy

 .d8888b.   .d8888b.
d88P  Y88b d88P  Y88b
888    888        888
888    888      .d88P
888    888  .od888P"
888    888 d88P"
Y88b  d88P 888"
 "Y8888P"  888888888

Why Bishop Fox

Our goal is to help you meet and exceed Amazon’s security standard as efficiently as possible.

Icon wheel

Deep Experience

Founded in 2005, we have grown to become the largest private offensive security professional services company in the world.

Icon attack

We Do One Thing

Bishop Fox is laser-focused on providing our clients expert advice to make the best possible security decisions for their business, their partners, and their customers.

Icon dbl diamond

Senior Attention

Partners and senior consultants drive service delivery, and we are committed to every project’s success. You won’t be handed off to a junior team.

Icon feedback loop

225+ Security Professionals

We’re the developers, engineers, and exploit writers behind some of the most popular offensive security tools out there – and the researchers behind some of the most creative discoveries. Offensive security is in our DNA.

Icon hex plus

Battle-tested

We’ve worked with the world’s leading businesses across every industry, and we’ve helped the latest high tech start-ups reach their full security potential.

 .d8888b.   .d8888b.
d88P  Y88b d88P  Y88b
888    888      .d88P
888    888      8888"
888    888      "Y8b.
888    888 888    888
Y88b  d88P Y88b  d88P
 "Y8888P"   "Y8888P"

Customer Story

Sonos Makes Secure Moves with Bishop Fox

I think the level of enthusiasm that they brought in general was really great to see. It was a challenge and they wanted to see if they could find problems and break into the product. And that’s exactly what you’re looking for in a good pen tester.

— Jonathan Wenocur, Sr. Software Engineering Manager
White Sonos logo on ioXt certification page. Sonos Makes Secure Moves with Bishop Fox.

Chosen By Top Companies.

UK logo white
Cst group logo
KE Logo
PNS logo white
ZD logo white
FB Logo white
Ventrilo.ai logo white
Logo aspire
August Home white logo for Bishop Fox customer story on  mobile application penetration testing. August: Built-in Security in IoT Devices. Application Security: Mobile Application Assessment Service.
Logo ftrack
White Sonos logo on ioXt certification page. Sonos Makes Secure Moves with Bishop Fox.
White Zoom logo for application security services case study.
Parrot logo for application penetration testing security case study.
Equifax Logo for customer story
UK logo white
Cst group logo
KE Logo
PNS logo white
ZD logo white
FB Logo white
Ventrilo.ai logo white
Logo aspire
August Home white logo for Bishop Fox customer story on  mobile application penetration testing. August: Built-in Security in IoT Devices. Application Security: Mobile Application Assessment Service.
Logo ftrack
White Sonos logo on ioXt certification page. Sonos Makes Secure Moves with Bishop Fox.
White Zoom logo for application security services case study.
Parrot logo for application penetration testing security case study.
Equifax Logo for customer story

ARE YOU READY?
Start defending forward.

We'd love to chat about your offensive security needs. We can help you determine the best solutions for your organization and accelerate your journey to defending forward.

Black on white artistic representation of a penetration testing engagement using a section of a robotic looking machine with an organic human feel.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.