Built-in safety checks to ensure driver safety and vehicle functionality
Compromise resistant design to mitigate cyber attacks
Information and data privacy security & compliance
Internal processes to ensure operational security best practices
Out-of-the-box ready with processes and mechanisms to comply with Cybersecurity Management Systems (CSMS) and Software Update Management Systems (SUMS) requirements.
One of the only OTA software update products on the market with an ASIL-D functional safety rating, enabling OEMs to confidently and safely manage software and firmware update packages to every ECU across the full vehicle lifecycle.
Compliance with user privacy and data rights as outlined in the EU’sGeneral Data Protection Regulation (GDPR) and other comparable international data protection standards.
Security checks, automotive-grade cybersecurity, and information best practices to ensure CCPA data protection compliance.
Google’s time-proven Android Automotive OS, Google apps, and cloud services utilize a multi-layered security defense system including, advanced encryption for data transfer and storage, 24/7 threat detection and response teams, and phishing-resistant security keys.
Amazon’s suite of native web services, including AWS IoT, Amazon RDS, Amazon S3, and Amazon Kinesis utilize automatic data encryption, network and application security controls, and vulnerability detection and analysis to ensure data privacy and protection.
Sibros’ Deep Connected Platform utilizes a compromise resistant framework designed to provide automotive-grade OTA cybersecurity and threat protection.
Approval and authentication of commands and updates require signature keys at multiple access points and users to prevent tampering and unauthorized usage.
All software versions, update packages, system changes, and associated vehicles utilize unique identifiers for consistency, transparency, verification, and traceability.
We ensure the functional safety of all new products and concepts with extensive concept testing and analysis prior to customer release.
Internal procedures and practices in accordance with the five Trust Services Criteria: availability, confidentiality, privacy, security, and processing integrity
(Type II in progress)
We utilize established quality management systems to continually improve our products, operations, and customer relations.
All employees undergo a thorough vetting process, including multiple interviews, a criminal background check, and introductory training. Upon departure, employee access to company systems, services, and applications is immediately disabled.
Regular communication and education on new operational security procedures, compliance training, and related best practices.
We have a dedicated Risk Committee that oversees the detection, assessment, and documentation of potential threats per the guidelines outlined in our Incident Response Policy.