Page 21 - AeM_June_2019
P. 21

BEST PRACTICES & STRATEGIES




       corporate IT or infrastructure can allow attackers to gain  entire vehicle product lifecycle, and includes the entire
       access to security-critical data and manipulate it for their  end-to-end overall vehicle system. By implementing the
       own  purposes,  sometimes  causing  in  the  process  holistic  magility  cyber  security  management  system
       massive damage to the company and vehicle occupants,  control  loop,  cyber  security  risks  are  becoming
       as well as other road users.                        increasingly  manageable  both  in  traditional  IT  and  in
                                                           terms of vehicle features.
       Cyber Security Management Systems make
       security tangible                                   Among  other  things,  Magility  is  as  well  a  certified
                                                           reseller  of  cyber  security  protection  software,  such
       Businesses  can  make  the  threat  of  cyber-attacks  on   as  Blueliv  software,  a  Spanish  company  with  a  very
       vehicle  fleets  manageable  if  they  implement  a  holistic   high  reputation.  Blueliv  identifies  cyber  threats  and
       cyber  security  management  system.  In  this  system,   helps   to   defend   against   them   quickly   and
       similar to a quality management system, all divisions are   comprehensively,  serving  right  now  more  than  100
       mapped, coordinated and holistically aligned with cyber   customers  worldwide,  including  the  Allianz  Group,
       security.                                           Banco Santander, Telefonica, just to name a few.

       Cyber  security  is  becoming  a  new  interdisciplinary   By analyzing their cyber platforms, Blueliv can pinpoint
       system function of the company. Automotive companies   which areas of security need to be addressed in-house
       are currently working on ways to integrate holistic cyber   and analyze what is happening outside the company in
       security long term into their processes and products over   cyber  security.  Internet  security,  in  particular  attack
       the entire lifecycle of a vehicle – thus, making cyber risks   security,   is   thereby   holistically   supplemented.
       manageable.                                         Companies  can  license  the  web-based  platform  and
                                                           have  all  interfaces  to  the  outside  in  real  time.  Due  to
       Magility’s  expert  team  has  developed  a  Cyber  Security   the  non-intrusive  character,  no  installation  in  a
       Management  System  for  the  automotive  industry  that   company's  own  IT  is  necessary,  which  makes  the
       encompasses  all  supplier  relationships  along  the   platform easy to deploy. ◊
       hardware  and  software  value  chain,  lives  along  the
                                                                                  By Nada Lea Welker, magility














































                                                 MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   16   17   18   19   20   21   22   23   24   25   26