+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


State of Automotive Cybersecurity—Key Trends, Solutions, OEM Activities, and Vendor Profiles

  • ID: 3626798
  • Report
  • February 2016
  • Region: Global
  • 78 pages
  • Frost & Sullivan
Connected Cars Demand a Holistic Security Approach, Starting from Vehicle Design


  • Argus Cybersecurity
  • Cohda Wireless
  • TowerSec
Government and consumers are concerned about cyber security in cars, as researchers were able to hack into various OEM models in 2015. This research service identifies key areas that offer scope for technology innovation and discusses cybersecurity initiatives for the automotive industry. In 2015, cybersecurity, secure data transfers, and data privacy were key challenges for consumers and government authorities. The study discusses OEM initiatives, Tier-1 supplier activities, key trends, specialist security company roles, and future business models for automotive cybersecurity.

Executive Summary—2014 Key Findings vs. 2015 Actuals

In 2020, more than % of the consumers are likely to consider security a key parameter when purchasing vehicles.

Automotive Cybersecurity Market: Key Findings vs. Actuals, Global, 2014–2015

Industry Consolidation

2014 Predictions:
The automotive cybersecurity industry was predicted to experience consolidation but OEMs and Tier-1 suppliers lacked the necessary security assets.

2015 Actuals/Examples:
- Intel Automotive Security Review Board (ASRB)
- Harman’s acquisition of TowerSec, Red Bend software, and Symphony Teleca in 2015 and early 2016 amounted to $ billion.
- In 2016, Argus Cyber Security and Check Point Software Technologies partner to protect connected Cars from hackers.


2014 Predictions:
Expected start-up and specialist companies focusing on security to play a crucial role.

2015 Actuals/Examples:
- Israel-based cybersecurity start-ups like TowerSec, Argus Cybersecurity etc and specialist companies from NA such as Security Innovation work closely with global OEMs. More than 50+ start-ups in Israel are focusing on various cybersecurity areas across different industries.
- Magna International recently collaborated with Argus Cybersecurity to develop a combined solution.
- In addition to Tier-1 suppliers, Cisco, HP, IBM, Dell, Microsoft, Google, and Amazon are other potential buyers.

Regulations and Government Initiatives

2014 Predictions:
Concerns about cyber threats will prompt government bodies to initiate research projects and proactively frame regulations similar to cybersecurity laws in other industries.

2015 Actuals/Examples
- Recent research results of car hacking draw OEMs and Tier-1 suppliers to work towards in-depth defence to mitigate risks.
- In the United States, the Security and Privacy in Your Car Act (SPY Car Act) proposes that OEMs focus on security initiatives (such as data protection, data privacy, supply chain security).
- In 2016, European ENISA (European Network and Information Security Agency) is to form a team of experts and start working with OEMs and partners to evaluate security initiatives related to connected cars and to draft security recommendations for OEMs.
Note: Product cover images may vary from those shown


  • Argus Cybersecurity
  • Cohda Wireless
  • TowerSec
1. Executive Summary—Key Findings and Changes from 2014
  • Executive Summary—2014 Key Findings vs. 2015 Actuals
  • Automotive Cybersecurity in 2015
  • Connected Cars and Autonomous Vehicles—Threat Vectors
  • Automotive Hacking Incidents—Quick Recap
  • Exhibit A—BMW ConnectedDrive Hacking Incident
  • OEM Challenges and SPY Car Act Findings
  • 2014 Automotive Security Investments
  • Security Initiatives—2015 OEM Activities
  • OEM Channel to V2X Security
  • OEMs and Tier-1 Suppliers—Focus and Investment Range
  • OEMs and Tier-1 Suppliers—Key Trends and Business Models
  • 2014/2025 Future Outlook of Vehicle Cybersecurity
2. Research Scope, Objectives, Background, and Methodology
  • Research Aims and Objectives
  • Key Questions This Study Will Answer
  • Related Research
  • Research Methodology
3. Review of Threats and Overall Security Posture
  • Automotive Cybersecurity—Road Ahead to 2025
  • Automotive Cybersecurity—Risks and Vulnerabilities
  • Distributed Security Architecture
  • Distributed Security Architecture (continued)
  • Automotive Cybersecurity—Enterprise Security
  • Enterprise Security—Data Privacy and Leakage
  • Supply Chain Security
  • Automotive Retail Security
4. Overview of Cybersecurity Ecosystem
  • Automotive OEMs and Cybersecurity Initiatives
  • Automotive Product Security—Tier-1 Activities
  • Cybersecurity Specialist Companies
  • Cellular Infrastructure, Semiconductor and Technology Companies
5. OEM Partnerships and Cybersecurity Activities
  • V2X—V2V + V2I Technology
  • 802.11P—Consortiums and Benefits
  • V2X Regional Protocols, Developments, and Adoption—Japan
  • V2X Regional Protocols, Developments and Adoption—Europe
  • V2X Regional Protocols, Developments, and Adoption—US
  • V2X—Key Partnerships and Initiatives
  • V2V Cost
  • GM 2017 Cadillac and V2X
  • Volkswagen and German Companies—Cybersecurity Organization
  • Volvo Cars—Cybersecurity Project
  • Tesla Big Bounty Program with White Hat Hackers
  • Honda V2X Test Drive—Europe
  • Safety Pilot Model Deployment (SPMD) Program
6. Vendor Profiles
  • Automotive Cybersecurity Ecosystem Participants
  • TowerSec
  • Harman 5+1 Layer Security Framework
  • Argus Cybersecurity
  • Security Innovation V2X Solutions
  • Cohda Wireless
  • Renesas Electronics Corporation
- 7. Automotive Cybersecurity—Recap and Conclusions
  • Automotive Cybersecurity—Recap and Conclusions
  • Automotive Cybersecurity and Alliances—Quick Recap
  • Automotive Companies Security Adoption—Current Status
  • Cybersecurity—Automotive Participants Perspective
  • Automotive Cybersecurity—Industry Participants Mind Share
  • Secure Code Challenges and Current Coding Practices
  • Cybersecurity—Industry Alliances and Partnerships
  • Automotive Cybersecurity—Business Impact and Timeline
  • Future Connected Car Use Cases Demand Security Specialists
  • Automotive Cybersecurity and Next Generation Vehicles
  • Automotive Cybersecurity—Extended Ecosystem
  • Automotive OEMs—OTA Approach
  • Automotive Cybersecurity and OTA
  • V2X Cost—DSRC Field Trials and Adoption Rate
  • Automotive Security Investments—Key Trends
  • Connected Car and Cybersecurity—Initiatives and Impact Analysis
  • The Last Word—3 Big Predictions
8. Appendix
  • Table of Abbreviations and Acronyms Used
Note: Product cover images may vary from those shown
- Argus Cybersecurity
- Automotive Cybersecurity Ecosystem Participants
- Cohda Wireless
- Harman 5+1 Layer Security Framework
- Security Innovation V2X Solutions
- TowerSec
- Renesas Electronics Corporation
Note: Product cover images may vary from those shown