Intelligent systems are everywhere - controlling road and rail infrastructure, improving vehicle performance and enhancing the passenger and driver experience. The proliferation of ECUs etc inside vehicles, interfacing with external data sources including entertainment, GPS, and diagnostics, creates new vulnerabilities and opportunities for cyber-intrusion. A fundamentally fresh and holistic design approach, building security into vehicles and transportation from the ground up, is required.
A reliable and flexible software platform, powered and hardened by KasperskyOS, that allows motor manufacturers to develop and implement a single secure gateway into connected vehicle ECUs, combining protection against cyber-intrusion with enhanced diagnostic technologies via over-the-air (OTA) links.
KasperskyOS is an operating system specifically designed protect diverse and complex embedded systems from the consequences of malicious code, viruses and hacker attacks. This is achieved partly through strong separation and policy enforcement, using trusted and reliable security methodologies and patented techniques.
A range of cybersecurity services for the automotive, rail and wider transportation industry that provide the analysis and information needed to enhance security operations and enable a proactive approach to be taken against advanced threats
Premium Support and Professional Services
Professional help is available whenever you need it. Operating in more than 200 countries, from 34 offices worldwide, we have you covered 24/7/365. Take advantage of our Premium support packages, or call on our Professional Services to ensure that you derive maximum benefit from your Kaspersky lab security installation.
Kaspersky Transportation solutions secures software-based the of connected vehicles and intelligent transport systems against unauthorized access and ongoing damage caused by cyberattacks including:
The theft and exploitation of driver and passenger credentials and confidential data
The implemention of unauthorized firmware
USB and OBD2 based attacks
Remote access and attacks via mobile devices
Data sniffing and Man-in-the-Middle-attacks
The exploitation of software vulnerabilities in generic and industry-specific applications
Let’s Start the Conversation and talk to one of our experts about how True Cybersecurity could inform your corporate security strategy, please get in touch.