comment on this article

C2A Security joins automotive platform consortium AUTOSAR

C2A Security, a provider of automotive cybersecurity solutions, has joined with AUTOSAR, a global automotive platform consortium of OEM and Tier 1 companies.

Core partners within the consortium include: BMW, Bosch, Continental, Daimler, Ford, GM, PSA Group, Toyota and Volkswagen, and C2A’s entry marks the first time an Israeli start-up has partnered with the alliance, and positions C2A Security as a cybersecurity contributor to the consortium.

As a Development Partner, C2A will collaborate with all partners to define cybersecurity infrastructure for security sensors and modules, ultimately working toward new AUTOSAR standards for improved vehicle performance, safety and, with the addition of C2A’s expertise, vehicle cybersecurity.

Since 2003, when the AUTOSAR consortium was established, partners have increased the exchangeability of software modules across all vehicle platforms and opened the industry standard for highly integrated complex E/E architectures.

“AUTOSAR and C2A both promote visibility, standardisation and market neutrality with the aim of making vehicles of today and tomorrow safer,” said C2A chief product and marketing officer Nathaniel Meron. “With automotive software and networks becoming more complex and interconnected by the day, C2A will be able to contribute to the development of a cybersecure ecosystem in collaboration with our AUTOSAR colleagues.”

The Development Partnership will grant C2A Security the right to use AUTOSAR technology and access to related intellectual property (IP) of other AUTOSAR partners, which will enable C2A to take further steps in the development of their cutting-edge cybersecurity products and cybersecurity lifecycle management platform.

C2A solutions are designed to be easily integrated into existing AUTOSAR projects with Core, Premium and Development Partners and will follow the AUTOSAR methodology. C2A will contribute to the quality and safety level of AUTOSAR software and E/E architecture with its embedded cybersecurity solutions.



Author
Neil Tyler

Comment on this article


This material is protected by MA Business copyright See Terms and Conditions. One-off usage is permitted but bulk copying is not. For multiple copies contact the sales team.

What you think about this article:


Add your comments

Name
 
Email
 
Comments
 

Your comments/feedback may be edited prior to publishing. Not all entries will be published.
Please view our Terms and Conditions before leaving a comment.

Related Articles