Overview | ||||||
Supplier Slogan | Embedded Security | Innovate. Engineer. Transform. Scale. | We create trust | |||
HQ Location | Israel | European Union | United States | United States | Germany | Israel |
Year Founded | 2016 | 2003 | 2001 | 1997 | 1995 | 2013 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | ||||||
Revenue | < $10m | $10-100m | $10-100m | $10-100m | $10-100m | < $10m |
Employees | 11 - 50 | 51 - 200 | 51 - 200 | 201 - 1,000 | 51 - 200 | 51 - 200 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | C2A offers a comprehensive suite of cyber security solutions, providing in-vehicle end-to-end protection. With our new multi-layer cyber approach for vehicles, we use different products to protect different layers inside the vehicle, securing various attack surfaces and scenarios. Our solutions were engineered from the ground-up with automotive manufacturers' needs in mind: cost, time-to-market and integration complexity. | ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. ESCRYPT offers protection for all kinds of embedded applications, corresponding infrastructure and organizational aspects. ESCRYPT provides its customers with solutions for all issues in IT-Security from one source. With its extensive experience in embedded security, ESCRYPT consists of unique and comprehensive expertise in many different branches. ESCRYPT provides a complete range of security products, consulting services and solutions tailored for specific industries. ESCRYPT services include Security Assessment, Security Strategy & Architecture, Customized Software, Customized Hardware, Certification Support, PKI & Key Management, Application & Code Testing and Training & Awareness. Featured Products: - CycurHSM - CycurKEYS - CycurLIB - CycurTLS | Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale. | Softeq Development Corporation was founded in 1997 in Houston, TX, as a full-stack software development services provider. Over the years, we shifted our focus from mobile and web application development to niche solutions — particularly, Machine Learning, immersive technologies and software and hardware for the Internet of Things. | TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security. Independence ... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies. In addition, numerous accreditations as well as certificates of national and international organisations prove our independence TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees. What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it. At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy. | As modern vehicles become more sophisticated, the more vulnerable they are to cyber attacks.
Argus works with the automotive industry to address the challenges posed by vehicle connectivity by providing comprehensive cyber security solutions and services to OEMs, Tier 1s, aftermarket solution providers and fleet managers. |
IoT Solutions | Perimeter: Penetration prevention, securing devices with CAN bus access
Network: IDPS safeguarding in-vehicle networks
Maintenance: In-vehicle end-to-end secured software diagnostics and maintenance solution
Endpoint: Embedded runtime protection, preventing malicious activity at ECU
Security Lifecycle Management: Comprehensive in-vehicle cyber security management platform | ESCRYPT is part of ETAS GmbH, a 100-percent subsidiary of the Bosch Group. ETAS GmbH provides innovative solutions for the development of embedded systems for the auto industry and neighboring segments of the embedded industry. As a system house, ETAS delivers a comprehensive product range that covers integrated tools and tool solutions as well as engineering services, consulting, training, and support. ETAS is represented in Germany, the United States, Japan, Korea, P.R. China, India, France, Great Britain, Sweden, Italy, Brazil, and the Russian Federation. | Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital Identity Management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world. | Softeq creates IoT solutions for personal and business-specific needs, including low-level software which ensures device-to-device/device-to-app connectivity and data exchange, full-scale software infrastructures for connected device implementation and management, and custom hardware. Our expertise encompasses:
|
| |
Key Customers | Softeq works with large and medium-sized enterprises and Fortune 500 companies, including Verizon, NVIDIA, Epson, Disney, Microsoft, HP, and AMD. | Applied Technologies Avea BioID GmbH DB Schenker Deutsche Post DHL Equinix HiSilicon Deutsche Telekom SEW Eurodrive
| ||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Application Infrastructure & Middleware | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareAutomation & Control | Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyDronesInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Wearables | Cybersecurity & Privacy | ||
Industries | Automotive | Automotive | AutomotiveFinance & InsuranceHealthcare & HospitalsRetail | AutomotiveEducationElectronicsHealthcare & HospitalsOil & GasRenewable Energy | AutomotiveSecurity & Public SafetySemiconductorsTelecommunications | AerospaceAutomotive |
Use Cases | Intrusion Detection Systems | Cybersecurity | Predictive MaintenanceProcess Control & OptimizationRemote CollaborationTrack & Trace of Assets | Security Claims Evaluation | ||
Functions | Field Services | Business Operation | Business OperationProduct Research & Development | |||
Services | Cybersecurity Services | Cybersecurity ServicesTesting & Certification | Cybersecurity ServicesCloud Planning, Design & Implementation Services | Cybersecurity ServicesHardware Design & Engineering ServicesSoftware Design & Engineering ServicesCloud Planning, Design & Implementation Services | Cybersecurity ServicesSoftware Design & Engineering ServicesTesting & Certification | Cybersecurity Services |
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | None | Minor | None | None |
Platform as a Service (PaaS) | None | None | None | Minor | None | None |
Application Infrastructure & Middleware | None | Minor | Minor | Moderate | None | None |
Analytics & Modeling | None | None | None | Moderate | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | None | None | Moderate | Minor | Moderate | None |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | Minor | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | Minor | None | None |
Wearables | None | None | None | Minor | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | Bosch.IOHarman (Samsung)Infineon |
Overview | ||||||
Supplier Slogan | Embedded Security | Innovate. Engineer. Transform. Scale. | We create trust | |||
HQ Location | Israel | European Union | United States | United States | Germany | Israel |
Year Founded | 2016 | 2003 | 2001 | 1997 | 1995 | 2013 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | ||||||
Revenue | < $10m | $10-100m | $10-100m | $10-100m | $10-100m | < $10m |
Employees | 11 - 50 | 51 - 200 | 51 - 200 | 201 - 1,000 | 51 - 200 | 51 - 200 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | C2A offers a comprehensive suite of cyber security solutions, providing in-vehicle end-to-end protection. With our new multi-layer cyber approach for vehicles, we use different products to protect different layers inside the vehicle, securing various attack surfaces and scenarios. Our solutions were engineered from the ground-up with automotive manufacturers' needs in mind: cost, time-to-market and integration complexity. | ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. ESCRYPT offers protection for all kinds of embedded applications, corresponding infrastructure and organizational aspects. ESCRYPT provides its customers with solutions for all issues in IT-Security from one source. With its extensive experience in embedded security, ESCRYPT consists of unique and comprehensive expertise in many different branches. ESCRYPT provides a complete range of security products, consulting services and solutions tailored for specific industries. ESCRYPT services include Security Assessment, Security Strategy & Architecture, Customized Software, Customized Hardware, Certification Support, PKI & Key Management, Application & Code Testing and Training & Awareness. Featured Products: - CycurHSM - CycurKEYS - CycurLIB - CycurTLS | Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale. | Softeq Development Corporation was founded in 1997 in Houston, TX, as a full-stack software development services provider. Over the years, we shifted our focus from mobile and web application development to niche solutions — particularly, Machine Learning, immersive technologies and software and hardware for the Internet of Things. | TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security. Independence ... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies. In addition, numerous accreditations as well as certificates of national and international organisations prove our independence TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees. What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it. At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy. | As modern vehicles become more sophisticated, the more vulnerable they are to cyber attacks.
Argus works with the automotive industry to address the challenges posed by vehicle connectivity by providing comprehensive cyber security solutions and services to OEMs, Tier 1s, aftermarket solution providers and fleet managers. |
IoT Solutions | Perimeter: Penetration prevention, securing devices with CAN bus access
Network: IDPS safeguarding in-vehicle networks
Maintenance: In-vehicle end-to-end secured software diagnostics and maintenance solution
Endpoint: Embedded runtime protection, preventing malicious activity at ECU
Security Lifecycle Management: Comprehensive in-vehicle cyber security management platform | ESCRYPT is part of ETAS GmbH, a 100-percent subsidiary of the Bosch Group. ETAS GmbH provides innovative solutions for the development of embedded systems for the auto industry and neighboring segments of the embedded industry. As a system house, ETAS delivers a comprehensive product range that covers integrated tools and tool solutions as well as engineering services, consulting, training, and support. ETAS is represented in Germany, the United States, Japan, Korea, P.R. China, India, France, Great Britain, Sweden, Italy, Brazil, and the Russian Federation. | Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital Identity Management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world. | Softeq creates IoT solutions for personal and business-specific needs, including low-level software which ensures device-to-device/device-to-app connectivity and data exchange, full-scale software infrastructures for connected device implementation and management, and custom hardware. Our expertise encompasses:
|
| |
Key Customers | Softeq works with large and medium-sized enterprises and Fortune 500 companies, including Verizon, NVIDIA, Epson, Disney, Microsoft, HP, and AMD. | Applied Technologies Avea BioID GmbH DB Schenker Deutsche Post DHL Equinix HiSilicon Deutsche Telekom SEW Eurodrive
| ||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Application Infrastructure & Middleware | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareAutomation & Control | Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyDronesInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Wearables | Cybersecurity & Privacy | ||
Industries | Automotive | Automotive | AutomotiveFinance & InsuranceHealthcare & HospitalsRetail | AutomotiveEducationElectronicsHealthcare & HospitalsOil & GasRenewable Energy | AutomotiveSecurity & Public SafetySemiconductorsTelecommunications | AerospaceAutomotive |
Use Cases | Intrusion Detection Systems | Cybersecurity | Predictive MaintenanceProcess Control & OptimizationRemote CollaborationTrack & Trace of Assets | Security Claims Evaluation | ||
Functions | Field Services | Business Operation | Business OperationProduct Research & Development | |||
Services | Cybersecurity Services | Cybersecurity ServicesTesting & Certification | Cybersecurity ServicesCloud Planning, Design & Implementation Services | Cybersecurity ServicesHardware Design & Engineering ServicesSoftware Design & Engineering ServicesCloud Planning, Design & Implementation Services | Cybersecurity ServicesSoftware Design & Engineering ServicesTesting & Certification | Cybersecurity Services |
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | None | Minor | None | None |
Platform as a Service (PaaS) | None | None | None | Minor | None | None |
Application Infrastructure & Middleware | None | Minor | Minor | Moderate | None | None |
Analytics & Modeling | None | None | None | Moderate | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | None | None | Moderate | Minor | Moderate | None |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | Minor | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | Minor | None | None |
Wearables | None | None | None | Minor | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | Bosch.IOHarman (Samsung)Infineon |