Balance of Security and Performance
Minimal ECU performance impact by considering EEA and ECU integration.
Modular and Configurable
AUTOSAR compatible. Enabling adequate features and configurations to meet different vehicles and service levels.
Ahead of Threats
Deploy virtual patches or IPS rules to prevent and intercept an exploit.
A Dynamic and Intelligent Detection and Response for Your Vehicle
VicOne's xCarbon (IDPS) encompasses multiple software components that uses known intrusion signatures to detect and analyze traffic, while proactively filtering malicious packets and blocking offending IPs. Detection logs and telemetry data are gathered from the vehicle and optimized before being sent to VicOne's xNexus and other VSOC for analysis; with AUTOSAR IDS protocol compatible.
Stay Atop Vulnerabilities
xCarbon is designed to protect against known and unknown vulnerabilities, but if an exploit does arise, the Virtual Patch and IPS rules acts as a safety measure by implementing layers of security policies and rules that prevent and intercept an exploit from taking network paths to and from a vulnerability.
- Virtual Patch
- Intrusion Prevention System (IPS) Rules
VicOne customers protected ahead of patch
Vulnerability Privately Disclosed
Virtual Patch Created
Vulnerability Publicly Disclosed
Other security vendors' customers at risk
Comprehensive Detection Enabled By Automotive Security Foresight
Not all data are equal and VicOne ensures that the right technique is deployed at the right time. Along each step of the data collection, from executing IDPS Rules, to machine learning and threat expert rules, these detection techniques progressively analyzes and filters out the threats for maximum detection and protection without false positives. Aside from broad protection, this results is an overall reduction of bandwidth which can further be investigated and blocked if malicious.
Protecting a Telematics Control Unit From Remote Attacks
Uber Says Lapsus$ Behind Recent Cybersecurity Incident
Uber links last week’s multifactor authentication (MFA) fatigue attack to the hacker group Lapsus$.
Securing the Automotive Supply Chain Through Software and Vulnerability Management
The automotive supply chain faces many hurdles ahead, from complying with new regulations to dealing with vulnerabilities and preparing for threats on the horizon. How can it equip itself to handle these challenges?
Uncovering Log4j Vulnerabilities in Connected Cars
Log4Shell was a critical flaw found in Apache Log4, a widely used Java-based logging library. In this entry, we discuss how this severe vulnerability could impact connected cars and how to better prepare for similar imminent threats.