CYBER SECURITY FOR THE CONNECTED AUTONOMOUS CAR

Identificar

Monitoring & Intelligence

  • Real Time Detection and Neutralization
    • CANBUS Packet Inspection
    • Context Analysis
  • Intrusion Prevention and Detection Systems (IDS/IPS)
  • Attack Mitigation
    • DoS Prevention
    • Behavior analysis
    • Dynamic Firewall
Identificar

Reactive Services

  • Zero days detection (based on behaviour)
  • GMV's Computer Security Incident Response Team (GMV-CERT)
  • Incident Management
  • Forensic Analysis

Cybersecurity Assessment

  • Cybersecurity Requirement definition
  • Cyber Threat Diagnostic
  • Threat Analysis
  • Vulnerability analysis and mitigation plan
Identificar

Protection solutions deployment and operation

  • Trusted Platform Module (TPM)
  • Trusted Software Validation
  • Hardware Security Module (HSM) integration
  • Multi-layer Security (from Servers to ECUs and CANBUS)

 

OUR SOLUTIONS