Page 21 - AeM_June_2019
P. 21
BEST PRACTICES & STRATEGIES
corporate IT or infrastructure can allow attackers to gain entire vehicle product lifecycle, and includes the entire
access to security-critical data and manipulate it for their end-to-end overall vehicle system. By implementing the
own purposes, sometimes causing in the process holistic magility cyber security management system
massive damage to the company and vehicle occupants, control loop, cyber security risks are becoming
as well as other road users. increasingly manageable both in traditional IT and in
terms of vehicle features.
Cyber Security Management Systems make
security tangible Among other things, Magility is as well a certified
reseller of cyber security protection software, such
Businesses can make the threat of cyber-attacks on as Blueliv software, a Spanish company with a very
vehicle fleets manageable if they implement a holistic high reputation. Blueliv identifies cyber threats and
cyber security management system. In this system, helps to defend against them quickly and
similar to a quality management system, all divisions are comprehensively, serving right now more than 100
mapped, coordinated and holistically aligned with cyber customers worldwide, including the Allianz Group,
security. Banco Santander, Telefonica, just to name a few.
Cyber security is becoming a new interdisciplinary By analyzing their cyber platforms, Blueliv can pinpoint
system function of the company. Automotive companies which areas of security need to be addressed in-house
are currently working on ways to integrate holistic cyber and analyze what is happening outside the company in
security long term into their processes and products over cyber security. Internet security, in particular attack
the entire lifecycle of a vehicle – thus, making cyber risks security, is thereby holistically supplemented.
manageable. Companies can license the web-based platform and
have all interfaces to the outside in real time. Due to
Magility’s expert team has developed a Cyber Security the non-intrusive character, no installation in a
Management System for the automotive industry that company's own IT is necessary, which makes the
encompasses all supplier relationships along the platform easy to deploy. ◊
hardware and software value chain, lives along the
By Nada Lea Welker, magility
MediaBUZZ Pte Ltd - Independant ePublisher for Asia