Skip to main content

Argus partners with Renesas to secure connected and autonomous vehicles against cyber attacks

Argus Cyber Security’s Connectivity Protection and Lifespan Protection solution suites have been integrated with Renesas Electronics Corporation’s R-Car H3 Computing Platform, in an agreement which aims to protect infotainment and telematics units in connected and autonomous vehicles against cyber-attacks. The Argus Connectivity Protection is designed with the intention of preventing malware installation, detecting operating system anomalies, isolating suspicious activity and stopping attacks from
January 9, 2018 Read time: 2 mins

Argus Cyber Security’s Connectivity Protection and Lifespan Protection solution suites have been integrated with Renesas Electronics Corporation’s R-Car H3 Computing Platform, in an agreement which aims to protect infotainment and telematics units in connected and autonomous vehicles against cyber-attacks.

The Argus Connectivity Protection is designed with the intention of preventing malware installation, detecting operating system anomalies, isolating suspicious activity and stopping attacks from spreading to the in-vehicle network.   Argus’ Lifespan Protection is said to enable automakers and fleet managers to continuously monitor the cyber health of their vehicles in the cloud, provide big data analytics to identifying patterns and emerging attacks as well as future-proof vehicles through over-the-air security updates. In addition, the combined technology is intended to allow automakers to seamlessly embed crucial cyber security measures without impacting production cycles or increasing project risk.

Yoni Heilbronn, chief marketing officer of Argus Cyber Security, said: "We're excited to integrate our cyber security solutions on Renesas R-Car H3, as it forms a key component in driving forward connected and autonomous vehicles and marks another milestone on our mission to protect all vehicles on the road from cyber-attacks. With vehicles becoming increasingly connected and the age of autonomous vehicles rapidly approaching, it is crucial that all stakeholders in the automotive supply chain prioritize cyber security and provide automakers with the ability to protect connected vehicles against cyber-attacks throughout their lifespan, regardless of the attack vector."

Related Content

  • Transportation infrastructure technology continues its advance
    July 17, 2012
    It is now 20 years since publication of the Strategic Plan for Intelligent Vehicle Highway Systems. A select group of luminary figures of the ITS industry give their assessment of progress to date This year the IVHS Strategic Plan turns 20, signaling the graduation of the field of Intelligent Transportation Systems from its tumultuous teens to young adulthood. After two decades tethered by the cords of youth and protected by the strict control of adult institutions, ITS has reached a turning point. Its y
  • Who’s connecting to your car?
    September 17, 2013
    Development services company Symphony Teleca (STC) and Guardtime, provider of keyless signature infrastructure (KSI) software and solutions are to partner in a deal that will develop security, safety, maintenance, and reliability capabilities to enhance the connected car.
  • ITS America publishes connected vehicle guidance
    April 22, 2015
    Guidance on the likely impact of multipath communications on connected vehicle development has been published by ITS America. ITS America’s Connected Vehicle Technical Insight looks at the challenges and opportunities wireless interoperability could provide in vehicle applications. In particular the 22-page document examines the processes by which data can be transferred from one vehicle to another (V2V), or between a vehicle and the infrastructure (V2I).
  • C-ITS in the EU: ‘It has got a little tribal recently’
    April 16, 2019
    As the C-ITS Delegated Act begins its journey through the European policy maze, Adam Hill looks at who is expecting what from this proposed framework for connected vehicles – and why some people are insisting that the lawmakers are already getting things wrong