Immune system for vehicle computers
Your benefits
Advanced features
Offers best-in-class features and comprehensive coverage of automotive-specific protocols, including UDS, SOME/IP, DoIP.
Optimized for ECUs
Field-proven ready-to-use solution, pre-integration in Linux and QNX.
Cybersecurity homologation
Enables compliance with mandatory regulations, such as UN R-155 and the ISO/SAE 21434 standard.
Build the intrusion detection system (IDS) you need
ESCRYPT Host-based IDS is an automotive software solution for detecting and managing security event information on Linux, QNX, and Android-based ECUs. It features a set of security sensors and basic configuration, adaptable to various monitoring scopes. Its rule-based approach is efficient and deterministic, leveraging existing system features and supporting additional custom security sensors.
ESCRYPT CycurGATE and ESCRYPT CycurIDS-ETH are automotive firewall and IDS solutions for automotive Ethernet, designed to prevent and detect attacks. These products achieve high performance through hardware-software co-design in automotive switches, support stateless, stateful, and deep packet inspections, and employ an efficient and deterministic rule-based approach. CycurIDS-ETH extends CycurGATE with enhanced security event generation and behavior analysis.
ESCRYPT CycurIDS-CAN is an automotive IDS for the Controller Area Network (CAN) to detect attacks. The provided configuration tool allows automated rule generation from OEM vehicle network specification files and extension with expert-created rules. This efficient and deterministic rule-based approach also supports complete simulation and testing of IDS on a developer computer using collected vehicle traces.
Continuous fleet-wide security monitoring over the entire vehicle lifecycle
Increasing connectivity entails a rising risk of cyberattacks on vehicles. ETAS has an answer to this: the ESCRYPT Intrusion detection and prevention Solution IDPS.
Holistic end-to-end solution
Maintaining the appropriate security of a connected fleet is a holistic and continuous activity. Detailed knowledge of the security status and potential attacks is paramount and required by upcoming regulations and standards.
Consequently, a lifecycle approach is necessary, encompassing active security monitoring of in-vehicle components and their communication, the fleet’s IT infrastructure, and the overall automotive threat landscape.
Contact us
Do you have any questions? Feel free to send us a message. We will be more than happy to help.
Contact us today!