Connected vehicles now outpace the growth in both mobile phones and tablets. While connectivity can increase road safety and improve the transit experience, the more vehicles become connected, the more vulnerable they are to cyber attacks. No longer the realm of science fiction, recent events have shown that cyber threats transcend vehicle make and model to include all cars and commercial vehicles equipped with embedded or aftermarket connectivity. Argus works with private and commercial OEMs, Tier 1s, fleet managers, dealerships and aftermarket connectivity providers to defend against vehicle hacking.
Given the potential for physical harm to motorists, passengers and property in case of a breach, Argus’ mission is to maintain road safety and to prevent costly vehicle recalls. Today, motorists, truckers and fleet operators expect advanced services without giving up their safety, security or competitiveness. Argus enables the benefits of connectivity by providing multi-layered, end-to-end solutions and services built on decades of cyber security and automotive expertise, tens of pending patents and tens of thousands of dedicated research hours. Committed to staying on the cutting edge, Argus empowers individuals and organizations to thrive in the age of connected vehicles.
Argus, the global leader in automotive cyber security, provides comprehensive and proven solution suites to protect connected cars and commercial vehicles against cyber-attacks. With decades of experience in both cyber security and the automotive industry, Argus offers innovative security methods and proven computer networking know-how with a deep understanding of automotive best practices. Customers include car manufacturers, their Tier 1 suppliers, fleet operators and aftermarket connectivity providers. Founded in 2013, Argus is headquartered in Tel Aviv, Israel, with offices in Michigan, Silicon Valley, Stuttgart and Tokyo.
There is no silver bullet when it comes to keeping hackers out or 100% guarantee that you won’t be hacked. Keeping vehicles safe from cyber attacks requires a holistic approach in which you must always assume a state of compromise.