CONTROL & VISIBILITY
SECURITY LIFECYCLE MANAGEMENT
Automotive Cyber Security Management System (CSMS) that empowers OEMs and their suppliers with visibility, control, and protection at scale.
Providing automotive-relevant analysis and protection.
Threat Analysis and Risk Assessment tool, fully compliant with ISO 21434.
Concept phase analysis (TARA) for the entire organization as required by the UNECE WP29 regulation and the ISO21434 standard.
Automation, reuse, built-in catalogs and seamless integration, allow a quick scalability of all your organization models for ISO 21434 compliance
Delegation of models and sub systems across your organization and supply chain allowing management and visibility of the distributed activities.
ADVANCED ANALYSIS TOOLS
Advanced analysis tools for setting and achieving your security policy goals. This includes: Attack trees builder and analysis, model risk setting, and insights for creating efficient security solutions
An orchestrated solution to design, deploy and maintain in-vehicle network protection across all vehicle model components.
Embedded Ethernet and CAN software only solution, that enables manage and control protection of in-vehicle networks.
Unique DL Automatic distribution algorithms of Network protection solution across model’s components that aims to maximize protection and performance while keeping security targets and priorities. Including code generation and configuration for model components.
Advanced UI that allows simulation, control, auto-prioritization and security insights based on the target EE architecture.
Embedded IDS Software solution for Ethernet and CAN, that allow efficient and run time configurable security protection.
Embedded runtime protection solution that analyzes vehicle SBOM, protects weaknesses, and supplies real time mitigation to new vehicle threats.
Runtime embedded protection solution that analyze vehicle SBOM, protect weakness, and response to new vehicle threats emerging in the post production phase
Benchmarked best in class runtime embedded protection, outperforming existing run time protection techniques.
Runtime activation shortening mitigation time for new threats.
Risk context visibility, for activation of the exact and necessary protection you need, avoiding performance degradation