Suppliers Israel C2A Security
This profile is not managed yet, if you would like to manage
this profile, please contact us at team@iotone.com
C2A Security Logo

C2A Security

Israel
Jerusalem
2016
Private
< $10m
11 - 50
Open website
C2A offers a comprehensive suite of cyber security solutions, providing in-vehicle end-to-end protection. With our new multi-layer cyber approach for vehicles, we use different products to protect different layers inside the vehicle, securing various attack surfaces and scenarios. Our solutions were engineered from the ground-up with automotive manufacturers' needs in mind: cost, time-to-market and integration complexity.
Read More
Perimeter: Penetration prevention, securing devices with CAN bus access

Network: IDPS safeguarding in-vehicle networks

Maintenance: In-vehicle end-to-end secured software diagnostics and maintenance solution

Endpoint: Embedded runtime protection, preventing malicious activity at ECU

Security Lifecycle Management: Comprehensive in-vehicle cyber security management platform
Read More
C2A Security is a provider of Industrial IoT cybersecurity services services, and also active in the automotive industries.
Industries
Automotive
Services
Cybersecurity Services
C2A Security’s Technology Stack maps C2A Security’s participation in the IoT technology stack.
  • Application Layer
  • Functional Applications
  • Cloud Layer
  • Platform as a Service
    Infrastructure as a Service
  • Edge Layer
  • Automation & Control
    Processors & Edge Intelligence
    Actuators
    Sensors
  • Devices Layer
  • Robots
    Drones
    Wearables
  • Supporting Technologies
  • Analytics & Modeling
    Application Infrastructure & Middleware
    Cybersecurity & Privacy
    Networks & Connectivity
Technological Capability
None
Minor
Moderate
Strong
Number of Similar Suppliers6
ESCRYPT (Bosch)
ESCRYPT (Bosch)
ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. ESCRYPT offers protection for all kinds of embedded applications, corresponding infrastructure and organizational aspects. ESCRYPT provides its customers with solutions for all issues in IT-Security from one source. With its extensive experience in embedded security, ESCRYPT consists of unique and comprehensive expertise in many different branches. ESCRYPT provides a complete range of security products, consulting services and solutions tailored for specific industries. ESCRYPT services include Security Assessment, Security Strategy & Architecture, Customized Software, Customized Hardware, Certification Support, PKI & Key Management, Application & Code Testing and Training & Awareness. Featured Products: - CycurHSM - CycurKEYS - CycurLIB - CycurTLS
Keyfactor
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
Softeq
Softeq
Softeq Development Corporation was founded in 1997 in Houston, TX, as a full-stack software development services provider. Over the years, we shifted our focus from mobile and web application development to niche solutions — particularly, Machine Learning, immersive technologies and software and hardware for the Internet of Things.
TÜV Informationstechnik GmbH
TÜV Informationstechnik GmbH
TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.Independence... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.In addition, numerous accreditations as well as certificates of national and international organisations prove our independenceTÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.
Argus Cyber Security
Argus Cyber Security
As modern vehicles become more sophisticated, the more vulnerable they are to cyber attacks. Argus works with the automotive industry to address the challenges posed by vehicle connectivity by providing comprehensive cyber security solutions and services to OEMs, Tier 1s, aftermarket solution providers and fleet managers.
Download PDF Version
test test