Skip to main content

SafeRide and Irdeto partner on cybersecurity for C/AVs

Cybersecurity company SafeRide Technologies Ltd and Dutch firm Irdeto have launched a solution to help original equipment manufacturers and Tier-1 suppliers protect connected and autonomous vehicles (C/AVs). Called Vsentry, the device combines network security with software security of the engine control unit to allow users to detect anomalies and respond to attacks. Vsentry uses an artificial intelligence engine and provides multi-layer protection for securing the connectivity perimeter and the in-vehi
June 8, 2018 Read time: 1 min
Cybersecurity company 8821 SafeRide Technologies Ltd and Dutch firm 8672 Irdeto have launched a solution to help original equipment manufacturers and Tier-1 suppliers protect connected and autonomous vehicles (C/AVs). Called Vsentry, the device combines network security with software security of the engine control unit to allow users to detect anomalies and respond to attacks.


Vsentry uses an artificial intelligence engine and provides multi-layer protection for securing the connectivity perimeter and the in-vehicle core layer against unauthorised operations and access attempts. Irdeto’s Cloakware for connected transport solution is intended to defend vehicles from reverse engineering, tampering and automated attacks.

Niels Haverkorn, general manager, connected transport, Irdeto, says the combined solution safeguards critical files and data and allows clients to secure vehicle software and telematics systems.

The partnership says the product also offers protection from zero-day threats that exploit an unknown computer security vulnerability.

UTC

Related Content

  • January 9, 2018
    Argus partners with Renesas to secure connected and autonomous vehicles against cyber attacks
    Argus Cyber Security’s Connectivity Protection and Lifespan Protection solution suites have been integrated with Renesas Electronics Corporation’s R-Car H3 Computing Platform, in an agreement which aims to protect infotainment and telematics units in connected and autonomous vehicles against cyber-attacks. The Argus Connectivity Protection is designed with the intention of preventing malware installation, detecting operating system anomalies, isolating suspicious activity and stopping attacks from
  • August 10, 2016
    Technologies to protect connected cars ‘not being utilised’
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
  • November 6, 2017
    SwRI investigates cybersecurity weaknesses in transportation management systems
    Southwest Research Institute (SwRI), in San Antonio, has been awarded a $750,000 (£573,000) contract from the Transportation Research Board to help state and local agencies address cyber-attack risks on current transportation systems and those posed by future connected vehicles. Cyber security firm, Praetorian will support SwRI by conducting a security audit of traffic management systems and develop a web-based guide to help transportation agencies learn how to safeguard equipment.
  • March 19, 2018
    Irdeto and Conjure promote Keystone vehicle access solution
    Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry. Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences. Keystone combines secure, tamper-proof policy management that