Cybersecurity Monitoring
The objective of Cybersecurity Monitoring is to keep products cybersecure after the development by continuously updating the known vulnerabilities and the state-of-the-art for cybersecurity controls.
Quma gives Cybersecurity Monitoring a clear structure with a flexible toolset that can easily be adapt to customer needs and already exiting capabilities, together with interfaces that allow the integration of highly specialized solutions.
Vulnerability Management
Vulnerability Management specifies the handling of newly discovered vulnerabilities, determining affected product types and products and the required mitigations.
Incident Response Management
An Incident Response is triggered when a cybersecurity incident occurs, meaning when a vulnerability is discovered in a product in the field. It manages the activities necessary to ensure the mitigation is applied with compliant documentation and communication.
Field Monitoring
Field Monitoring tracks data from products in the field and analyzes them for triggers that indicate possible cybersecurity incidents.
Supplier Monitoring
Supplier Monitoring continuously assesses supplier capabilities and deliverables to ensure the assumptions about the cybersecurity level of supplied products and services are valid.
CVE Monitoring
CVE Monitoring utilizes public databases of previously discovered cybersecurity vulnerabilities (Common Vulnerabilities and Exposure) and crosschecks them with the organizations products.
Control Monitoring
Control Monitoring ensures that the Cybersecurity Controls that have been applied on products are kept state-of-the-art, not only for new productions but also for the products in the field.
Support Monitoring
Support Monitoring protects products in the field from vulnerabilities that are introduced through the discontinuation or modification of any cybersecurity support activity by tracking and analyzing the impact on the fleet.
Fleet Database
The Fleet Database keeps a record of all vehicles or vehicle components in the field and the status of all cybersecurity relevant parameters, making it possible to triage in case it is affected by a vulnerability.
Qumasoft
Better automotive cybersecurity, but at half the cost and in half the time.
Get in touch!
...