World-class offerings leading the way
Protect driver privacy and physical safety
Strengthen your automotive security and protect your fleet against the latest vulnerabilities. Our experience includes:
Automotive Cyber Security and Resilience Assessments - utilising Attacker-in-the-loop methodology
Automotive Network Training
We regularly undertake doctoral and post-doctoral research in automotive cyber security. This is available for both commercial and private commissioning and is tailored to your requirements.
Lab Facility and Tooling
Contact email@example.com for more information.
Vehicle Security Assessments
Individual (operational and bespoke) or fleet solutions
End to End solutions
We are experienced operating through an asset’s entire lifecycle and our services feed into full end to end fleet management.
Specify: We can work with you to set high level and detailed asset requirements, including cost benefit analysis, service design and service value (availability, adaptability, necessity, operational relevance, usability and affordability) across a range of financial models.
Design: We can design systems, policies, guidance and components to meet requirements or evolving requirements, and have a long history of specialist asset manufacture and project management.
Procure (Build, Adapt and Convert): We can procure assets, project manage the entire process and bespoke build, adapt or convert in line with your requirements and maintenance plans, (excise and insurance as well, if required).
Manage: We can provide full in-life service schedule and delivery. Not only the implementation of factory service schedule, updates, settings and consumables, but recalls, bespoke service schedules, diagnostics and prognostics to ensure that any asset is operational for the maximum utility. Within Manage we can undertake regular TSCM and cyber hygiene assessments and undertake the pre- and post-security assessment if or when an asset is out of the controller’s control. We refer to this as the cyber valet
End of Life disposal. When end of life is agreed, we securely ensure that all sensitive data and information is removed from an asset, such that an Operational Security Advisor (OpSy) is satisfied and an organisation’s environmental commitments are upheld.