Limited evaluation access is available for organizations with relevant hardware analysis, security, or validation use cases. Access is granted on a case-by-case basis.
To keep evaluation results meaningful, we prioritize cases where capture conditions can be described and repeated.