T-Systems and Argus Cyber Security, an independent subsidiary of the technology company Continental, will work together on cyber defense for cars.
This was announced by the companies at the Hanover Industrial Trade Fair. T-Systems is planning a Security Operations Center specializing in vehicles (wAutomotive SOC). The company announced this in mid-March. With Argus the company is now bringing an important partner on board.
The Israeli automotive cyber security specialist has a highly developed Information and Event Management System (SIEM) for cars as well as in-vehicle solutions. Car manufacturers (OEMs) and fleet operators use it to identify anomalies for connected vehicles. Attacks from the Internet are increasing rapidly. T-Systems CEO Adel Al-Saleh says: “We are currently seeing a new peak of 32 million daily attacks on our systems. Attackers don’t stop in front of our cars either. The connected vehicle needs a digital bodyguard and real-time cyber defense.”
Robust solution for protecting vehicles
“We are delighted that Argus and T-Systems are working together to develop a comprehensive and robust solution for cyber security in the automotive sector – from the vehicle to the wcloud and beyond,” said Werner Koestler, Head of Strategy, Interior Division, Continental. “We are bringing together the largest wIT service provider in the automotive industry in Germany with Argus. The joint solution will strengthen cyber security in cars. This will enable OEMs and fleet operators to realize their vision of safe and secure mobility.”
“Argus’ focus has always been on averting attacks on the automotive industry and anticipating future threats,” said Yoni Heilbronn, Chief Marketing Officer of Argus Cyber Security. “Together with T-Systems, we will offer customers an advanced and robust wAutomotive Security Operation Center. To do this we link, fuse and analyze multiple data sources. This enables automakers to respond immediately to threats. In addition, the wAutomotive SOC helps the industry to act with foresight – even in ever-changing threat situations which are inherent to cyber security.”