Skip to main content

Cybersecurity Monitoring

The objective of Cybersecurity Monitoring is to keep products cybersecure after the development by continuously updating the known vulnerabilities and the state-of-the-art for cybersecurity controls.

Quma gives Cybersecurity Monitoring a clear structure with a flexible toolset that can easily be adapt to customer needs and already exiting capabilities, together with interfaces that allow the integration of highly specialized solutions.

Vulnerability Management

Vulnerability Management specifies the handling of newly discovered vulnerabilities, determining affected product types and products and the required mitigations.


Incident Response Management

An Incident Response is triggered when a cybersecurity incident occurs, meaning when a vulnerability is discovered in a product in the field. It manages the activities necessary to ensure the mitigation is applied with compliant documentation and communication.

Field Monitoring

Field Monitoring tracks data from products in the field and analyzes them for triggers that indicate possible cybersecurity incidents.

Supplier Monitoring

Supplier Monitoring continuously assesses supplier capabilities and deliverables to ensure the assumptions about the cybersecurity level of supplied products and services are valid.

CVE Monitoring

CVE Monitoring utilizes public databases of previously discovered cybersecurity vulnerabilities (Common Vulnerabilities and Exposure) and crosschecks them with the organizations products.

Control Monitoring

Control Monitoring ensures that the Cybersecurity Controls that have been applied on products are kept state-of-the-art, not only for new productions but also for the products in the field.

Support Monitoring

Support Monitoring protects products in the field from vulnerabilities that are introduced through the discontinuation or modification of any cybersecurity support activity by tracking and analyzing the impact on the fleet.

Fleet Database

The Fleet Database keeps a record of all vehicles or vehicle components in the field and the status of all cybersecurity relevant parameters, making it possible to triage in case it is affected by a vulnerability.

Qumasoft

Better automotive cybersecurity, but at half the cost and in half the time.

Get in touch!

...