Download PDF

C2A Security

C2A offers a comprehensive suite of cyber security solutions, providing in-vehicle end-to-end protection. With our new multi-layer cyber approach for vehicles, we use different products to protect different layers inside the vehicle, securing various attack surfaces and scenarios. Our solutions were engineered from the ground-up with automotive manufacturers' needs in mind: cost, time-to-market and integration complexity.

more...
  • SNAPSHOT
  • Israel
    2016
    Private
    < $10m
    11 - 50
    Open website
  • TECHNOLOGY STACK
  • C2A Security’s Tech Stack maps C2A Security’s participation in the IoT tech stack.
    • Application Layer
    • Functional Applications

    • Cloud Layer
    • Platform as a Service
      Infrastructure as a Service

    • Edge Layer
    • Automation & Control
      Processors & Edge Intelligence
      Actuators
      Sensors

    • Devices Layer
    • Robots
      Drones
      Wearables
    • Supporting
      Technologies
    • Analytics & Modeling
      Application Infrastructure & Middleware
      Cybersecurity & Privacy
      Networks & Connectivity
    Technological Capability
    None
    Minor
    Moderate
    Strong
  • IOT SNAPSHOT
  • C2A Security’s IoT Snapshot maps the range and focus areas of C2A Security’s IoT business across Technologies, Use Cases, Industries, and Services. Only categories with active products will be shown. Missing categories indicate that there is no activity in those areas.
    Industries
    Automotive
    Services
    Cybersecurity Services
  • IOT SOLUTIONS
  • Perimeter: Penetration prevention, securing devices with CAN bus access

    Network: IDPS safeguarding in-vehicle networks

    Maintenance: In-vehicle end-to-end secured software diagnostics and maintenance solution

    Endpoint: Embedded runtime protection, preventing malicious activity at ECU

    Security Lifecycle Management: Comprehensive in-vehicle cyber security management platform
  • KEY CUSTOMERS
  • CASE STUDIES
  • HARDWARE
  • SOFTWARE
  • PODCASTS
  • MEMBERSHIP
  • INDUSTRIES
  • FUNCTIONS
  • SIMILAR SUPPLIERS
  • ESCRYPT (Bosch)
    ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. ESCRYPT offers protection for all kinds of embedded applications, corresponding infrastructure and organizational aspects. ESCRYPT provides its customers with solutions for all issues in IT-Security from one source. With its extensive experience in embedded security, ESCRYPT consists of unique and comprehensive expertise in many different branches. ESCRYPT provides a complete range of security products, consulting services and solutions tailored for specific industries. ESCRYPT services include Security Assessment, Security Strategy & Architecture, Customized Software, Customized Hardware, Certification Support, PKI & Key Management, Application & Code Testing and Training & Awareness. Featured Products: - CycurHSM - CycurKEYS - CycurLIB - CycurTLS
    UNITY Consulting
    UNITY Consulting, an affiliated firm of UNITY AG, is a management consultancy for future-oriented corporate management. They create bottom line oriented innovative processes and business models – from the initial concept to execution.
    Argus Cyber Security
    As modern vehicles become more sophisticated, the more vulnerable they are to cyber attacks. Argus works with the automotive industry to address the challenges posed by vehicle connectivity by providing comprehensive cyber security solutions and services to OEMs, Tier 1s, aftermarket solution providers and fleet managers.
  • PARTNERS
© 2021 IoT ONE