R2C_KeyVisuals_eTruck_Car_1660x680.jpg

Security layer 1

Security approach and products

Individual ECU

Protect critical host ECUs with anomaly detection, OS hardening and authorization and validation.

Cybersecurity_SecLayer01.png

Assets

  
  • Hardware trust anchors (P)
  • Hardware security module firmware (P)
  • Secure boot / bootloader (P)
  • Secure update / diagnostics (P)
  • Isolation and data protection (P)
  • Identity and access management (P)

  

Prevent (P) / Detect and respond (DR)

Implementation

Our DevSecOps platform helps automotive manufacturers apply security measures in every step of the design and implementation processes. It allows development teams to shorten time between updates, reduce costs and better meet the market demand for functional flexibility.

  

From threat analysis & risk assessment automation (TARA), through code security, supply chain security and vehicle security testing, our toolchain enables a better cyber security posture. In vehicle embedded technologies such as intrusion detection and prevention systems (IDPS) and hardware-secured modules make sure the vehicles, and its components are protected in real-time.

Contact

Do you want to know more?

The contact form is temporarily unavailable due to scheduled maintenance. It will be restored soon.

*If the contact form does not load, please check the advanced cookie settings and activate the functional cookies for the purpose of contact management.