We are happy to announce that Argus Connected ECU Protection will be securing more than 17 million vehicles in production projects for multiple OEMs over the next few years, and will be on the road as early as December 2020. This great achievement is a testament to the progress that Argus and the industry have made towards protecting vehicle fleets and the public from the risk of cyber threats.
Argus Connected ECU Protection offers multiple, independent software modules that provide layers of protection, detection, and response to a wide range of automotive attack scenarios. Built to secure ECUs running POSIX-based operating systems, such as Telematics, Infotainment, ADAS and HPC units, Argus Connected ECU Protection offers support for Linux, Android OS, Adaptive AUTOSAR, QNX, and WebOS Auto.
Test the Latest Version Release with Our Quick Evaluation Kit
With the global pandemic making product evaluations more complex than ever, we have developed a technical evaluation kit that enables our customers to get hands-on experience with the latest Argus Connected ECU Protection software version 3.4, within days of initial set up. Based on a readily available Raspberry Pi SBC, the kit provides you with ready-made attack scenarios that you can test in a near-real ECU environment at your convenience.
What’s New in Release 3.4
Argus Connected ECU Protection version 3.4 introduces the following enhancements:
- Minimizes integration efforts, enabling integration in a production environment in less than four weeks
- Reduces the product footprint with lower RAM consumption and CPU usage
- Includes modifications as per customer request during production, such as runtime configuration flags
Prepare for Upcoming Regulations
Argus’ Connected ECU Protection helps OEMs and Tier 1s secure their components against cyber attacks and address upcoming regulations, such as UNECE’s WP.29, which states:
“The vehicle manufacturer shall implement measures for the vehicle type to:
(a) detect and prevent cyber-attacks against vehicles of the vehicle type;
(b) support the monitoring capability of the vehicle manufacturer with regards to detecting threats, vulnerabilities and cyber-attacks relevant to the vehicle type;
(b) provide data forensic capability to enable analysis of attempted or
“The vehicle manufacturer shall protect critical elements of the vehicle type against risks identified in the vehicle manufacturer’s risk assessment. Proportionate mitigations shall be implemented to protect such elements”