+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


AV Cybersecurity Technology, Market, and Industry Analysis

  • ID: 4876991
  • Report
  • December 2019
  • Region: Global
  • M14 Intelligence
1 of 4


  • Airbiquity
  • Check Point Software
  • Levl Technologies
  • NXP
  • MORE

The IT industry spends a huge amount of resources and money on cybersecurity and there are thousands of companies working in this ecosystem. The companies are witnessing an increasing amount of risk every year and these risks could be devastating for their business as it will lead to loss of reputation, loss of money, and loss of data. Compared with the IT industry, the automotive industry is smaller and has dozens of OEM and thousands of automotive suppliers, technology providers, fleet operations providers. However, the impact is greater in terms of risk and life.

In recent years cyber threats in automotive have become one of the popular topics and most of the companies are researching the various threats and risks which are associated with modern vehicles. In today’s date, automotive cyber-attacks could impact to the industry and can reach to the loss of billions of dollars. For instance, the hackers are mostly targeting the physical systems of the cars, to car theft, data breaches, and fraud. Moreover, all these attacks vary in size and consequences and can have a distinct effect on the automobile industry. By evaluating all the data, it is found that 27.6 percent of incidents involve unauthorized control over car systems in automotive cyber-attacks. Additionally, researchers have also shown that how could they disable the car airbags by exploiting a zero-day vulnerability. Clearly, the risks of cyberattacks on smart mobility are far greater than IT network security. The companies would be worried about the network cyber-risks, affecting their servers and data, but the consequences are far less severe. The worst scenario would be the loss of earning, theft, data privacy or property damage. However, the loss of human lives is nothing less than any other stake in automotive cyber-attacks.

Taking all this into consideration there is a need for multi-layered security which could offer cybersecurity solutions to the automotive players. Moreover, the amount of cyber-attacks is increasing, and it is growing vulnerable over the time period. Therefore, the key players are heavily investing in cybersecurity companies for improving their perimeter security. For this various stakeholder are developing the number of choices for automotive security which would protect them from different attacks. Among these choices, in-vehicle security protects the individual components of the vehicle and can avoid proximity attacks as well as some remote attacks. In addition to this in-vehicle security, network security keeps a fortress at the IT network and backend. Furthermore, cloud security in automotive is used to detect and resolve cyber-security attacks or misuse of smart mobility services. Moreover, cloud security also handles single and multi-vehicle attacks as well as attacks on telematics and mobility services. The companies like Argus Cyber Security, Upstream Security, Karamba Security, Guardknox, Arilou Technologies, SafeRide Technologies, Trillium, Enigmatos, C2A Security are providing in-vehicle, cloud and network security. Additionally, if the number of connected vehicles hit the roads, software vulnerabilities are becoming accessible to a malicious hacker using the cellular network, Wi-Fi, and physical connection to exploit them. Henceforth, the companies are also developing software protection systems for car manufacturers from defending these attacks.

According to the lead analyst, it clearly shows that automotive cloud security works better with the complementary solution and it has a clear approach in defense and depth, with multi-layer security. Moreover, when considering the time for implementation the automotive cloud security is deployed in the cloud environment where the data is sent, and therefore it requires less time for implementation. While in-vehicle security is deployed physically inside the cars and thus is more likely to take the longest time to implement. As per research, it shows that automotive cloud protection and in-vehicle security could play a crucial role in defending a large amount of risk for smart mobility.

The automotive industry is growing rapidly and so the cybersecurity protocols that are used to protect the vehicle from the cyberattacks. As per VP of Marketing, leading cybersecurity company, it is said that hackers can cost car manufacturers $1.1 billion loss on average and it could reach $23 billion by 2023. Besides, in the year 2018, car manufacturers like Tesla, Porsche, BMW and Honda as heavily affected due to the cyber-attacks. Therefore, for assuring the security of the vehicle from hackers the car manufacturers are partnering with the key industry players to attain a prominent place in this market. Moreover, the connected vehicles are likely to be most affected by the cyber threats and the connected vehicle market is growing at a CAGR of 24.6 percent between 2019 to 2021. Hence, the car manufacturer needs to focus on improving their defending security from these threats, thus OEMs are partnering with the key players in these ecosystems. For instance, Volkswagen has collaborated with Trillium whereas Upstream and SafeRide Technologies has collaborated with Renault Nissan Alliance. Moreover, for securing the connected vehicles the companies like FCA and Hyundai has partnered with HARMAN and CISCO. In addition to car manufacturers, the autonomous shuttle companies are also strategically collaborating with cybersecurity players.

For example, SafeRide Technologies has partnered with ISFM and ST Engineering for deploying cybersecurity solutions for the autonomous bus. Similarly, Ohmio Automation has partnered with Arilou Technologies for the development of cybersecurity solutions in their new generation autonomous buses. However, for developing the robust solution for car manufacturers the cybersecurity companies need to overcome the challenge of timely delivery of the security packages. For this, automotive cybersecurity players are developing nw ways to reduce the time lag for updates and it would help them to take a competitive edge among the players in the ecosystem.

According to the analyst, RF technologies, telematics, and self-driving (autonomous) vehicles are expected to have greatest risk. As per the research of SAE International and Synopsys the autonomous driving cars have a unique susceptibility, which lies in their LiDAR and radar systems. Therefore, hackers can manipulate the cars physical controls without gaining control over car actual systems. And this can be done through LiDAR and other vision sensor systems. Furthermore, this helps the hackers to misguide the sensor to identify obstacles. Researchers from the Korea Advanced Institute of Science and Technology has demonstrated two kinds of attack against LiDAR a spoofing and saturation attack. Similarly, the GNSS receiver also requires detection and protection against spoofing attacks. Therefore, the Israel startup Regulus Cyber is developing Pyramid GNSS technology that provides tools to defend against GNSS spoofing attacks. Equally to the autonomous driving, RF Technologies and Telematics consist of high susceptibility. The companies like Argus Cybersecurity, GuardKnox, Secure, Fortinet, Verizon Enterprise, Intellimec, and Mix Telematics are providing telematics solution to the car manufacturer. Other than telematics, infotainment security is also concerned and companies like Karamba security, Arilou Technologies, GuardKonx and others are developing infotainment security solutions for the car manufacturer and automotive supplier. The below figure gives a detailed analysis of each application.

Most of the cybersecurity startups are based in Israel, for instance, Argus Cyber Security, Upstream Security, C2A Security, Enigmatos, GuardKnox, Arilou Technologies, SafeRide Technologies, Cybellum, and Regulus Cyber. Among these startups, Argus Cyber Security appears to be dominating this market. In November 2017, one of the leading automotive supplier Continental has acquired Argus Cyber Security at estimated of $450 million. Thus, Argus Cyber Security has become part of Continental’s subsidiary Elektrobit. Moreover, Argus has also partnered with Telekom, Singtel, NXP, NVIDIA, Phantom Auto, Ecrisson, STMicroelectronics, Renesas, Renevo, Qualcomm, Infineon, and Magna International. Following table gives the details analysis of each player partnership portfolio. Similarly, companies like, Karamba Security, Arxan Technologies, Trillium, Palo Alto Networks, NRI Technologies are based in the U.S. and partnered with key players in the automotive ecosystems for gaining the strategic position. The below table gives you a detailed analysis of players in the U.S. The rising safety concern and increasing demand for reliable transportation systems also anticipate the demand for cybersecurity solutions, which will help this market to grow.

Key Questions Answered

  • Who are the leading OEMs, Tier 1s, Robotic Vehicles Companies, Autonomous and Connected Car Solutions Provider has adopted AV cybersecurity solutions?
  • Which type of AV cybersecurity solutions has a higher demand from the customers?
  • What business models are adopted by the leading cybersecurity solutions providers?
  • What is costing model adopted by the leading cybersecurity solutions providers?
  • Who are the new entrants and startups entering the AV cybersecurity ecosystem?
  • How is AV cybersecurity ecosystem structured?
  • What are the strategic developments adopted by key market players? And their in-depth analysis of strategies and their impact on the competition?
  • What is the market size for AV cybersecurity and market forecast between 2019 and 2030?
  • Which AV cybersecurity applications have the highest demand and what is the expected market growth for these applications between 2019 and 2030?
  • Who are leading players in the AV cybersecurity market?
  • What are the market drivers, challenges and future opportunities that affect the industry dynamics?
  • What are strategies followed by OEM, tier-1 suppliers and technology providers?
  • What is the penetration rate of the AV cybersecurity application?
  • Which is the most effective security type among network security, in-vehicle security, and automotive cloud security?
  • Which automotive application has the highest cybersecurity risk? And what measures are taken by the players in the ecosystem for defending various risks?
  • What is the market size of the connected passenger vehicle, autonomous vehicles, and robotic car?
Note: Product cover images may vary from those shown
2 of 4


  • Airbiquity
  • Check Point Software
  • Levl Technologies
  • NXP
  • MORE

1. Research scope & methodology
1.1. Scope
1.2. Methodology

2. Changing Industry Dynamics
2.1. Role of cybersecurity in ADAS and Autonomous Driving
2.2. Benefits, Challenges, Opportunities, and Drivers of AV cybersecurity
2.2.1. Challenges Pricing model for autonomous driving Updates and time lag for maintenance and troubleshooting
2.2.2. Opportunities The Growing cloud-based application Rise in ADAS and autonomous driving
2.2.3. Drivers Increasing number of connected cars Legislation and policy for vehicle data protection.
2.3. Current and Planned R&D Investments in AV cybersecurity ecosystem by leading players across the ecosystem
2.4. Public and Private investment for the development of AV cybersecurity

3. AV Cybersecurity Market Analysis
3.1. Based on in-vehicle security market assessment
3.1.1. Supplier analysis
3.1.2. In-vehicle security market analysis
3.2. Based on Software market assessment
3.2.1. Supplier analysis
3.2.2. Software market analysis
3.3. Based on network security market assessment
3.3.1. Supplier analysis
3.3.2. Network security market analysis
3.4. Based on automotive cloud security market assessment
3.4.1. Supplier analysis
3.4.2. Automotive Cloud Security market analysis

4. Consumer based market analysis
4.1. Based on OEM and Tier 1 market assessment
4.1.1. Recent development
4.1.2. Consumer analysis
4.1.3. OEM market analysis
4.2. Based on Robotaxi market assessment
4.2.1. Recent development
4.2.2. Consumer analysis
4.2.3. Robotaxi market analysis

5. Market assessment based on Application
5.1. On-Board Diagnostics security
5.1.1. Companies working under On-Board Diagnostics
5.1.2. On-Board Market analysis
5.2. Communication security
5.2.1. Companies working under communication security
5.2.2. Communication security Market analysis
5.3. Safety Systems security
5.3.1. Companies working under safety systems security
5.3.2. Safety systems security Market analysis
5.4. Infotainment security
5.4.1. Companies working under infotainment security
5.4.2. Infotainment security Market analysis
5.5. Telematics
5.5.1. Companies working under telematics
5.5.2. Telematics Market analysis

Note: Product cover images may vary from those shown
3 of 4


  • Airbiquity
  • Check Point Software
  • Levl Technologies
  • NXP
  • MORE
  • The author analyzes and tracks multiple sub-domains such as ADAS, Autonomous Driving, e-Mobility, Connected Solutions, Sensors and SOCs, component and wafer-level analysis, AV cybersecurity, Mapping and Navigation, GNSS and analytics, software and computing. The Automotive technology team is comprised of 15 Consultants and 4 Subject Matter Experts across the globe.
  • The AV cybersecurity research database on supplier’s analysis, OEMs, Tier 1s, robotic vehicles manufacturers, market size estimation and forecast, and autonomous and e-mobility vehicles sales data is exhaustive and tries to answer in-depth questions of the players across the ecosystem.
  • The database gives deep-dive investigation into the AV cybersecurity industry and detailed analysis on the cybersecurity technologies, applications and trends that enable the AV cybersecurity market.
  • AV cybersecurity technology like network security, in-vehicle security, and automotive cloud security are mentioned and their technology market is mentioned in the report
  • AV cybersecurity application like safety system, infotainment, telematics, onboard diagnostics, and communication are mentioned in this report and which company adopts which application security is mentioned in the report
  • The ecosystem - cybersecurity technology provider, automotive supplier, and OEM and robotic vehicle provider. For instance- Trillium collaborated with Volkswagen to join the VW Data: Lab Munich program. In this collaboration Trillium work with Volkswagen innovation arm, researcher and other actors to execute an automotive cybersecurity project.
  • Market penetration of autonomous driving, connected vehicles, and robotics cars in the automotive industry and future adoption trends
  • The AV cybersecurity report contains the shipments of vehicles, technology types, CAGR, penetration rate, market size and analysis of the companies in the ecosystem.
  • Which technology can be implemented quickly with less cost, and which technology is effective for defending the largest number of risks?
  • Argus Cyber Security and Karamba Security are dominating this market and which technology do they adopt is mentioned in the report.
  • Companies such as Volkswagen, Renault-Nissan, Hyundai, BMW, FCA, Jaguar Land Rover, and Faraday Future adopt the AV cybersecurity technology, and when it would commercialize autonomous driving with cybersecurity.
Note: Product cover images may vary from those shown
4 of 4
  • Advanced Telematics Systems  (HERE Technologies)
  • Airbiquity
  • Akamai Technologies
  • Allison Transmission
  • Alpine
  • Amazon Web Services
  • Argus Cyber Security
  • Arilou
  • Arxan
  • Arxan Technologies
  • Autoliv
  • AVL Software
  • BAIC
  • Baidu
  • Blackberry
  • BMW
  • Booz Allen
  • Bosch
  • Broadcom Inc
  • Bugcrowd
  • C2A Security
  • Calsonic Kansei
  • Capricode
  • Cato Networks
  • Check Point Software
  • Chronicle
  • Claroty
  • Clavister
  • Continental
  • CrowdStrike
  • Cybellum
  • Cylance (Blackberry acquired)
  • Cypress Semiconductor
  • Dell EMC CSG
  • Dellfer
  • Delphi
  • Denso
  • Desay SV Automotive
  • DSA
  • DXC Technology
  • Elektrobit
  • Enigmatos
  • Entrust Datacard
  • Ericsson
  • Faurecia
  • Fescaro
  • FireEye
  • Fortinet
  • Fujitsu
  • GateHouse Logistics
  • Gemalto
  • Giesecke & Devrient
  • Green Hills
  • GuardKnox
  • HDBaseT Automotive
  • Hitachi Solution
  • Honeywell
  • Hyundai  Mobis
  • IBM
  • Infieneon
  • Intel
  • Irdeto
  • ISFM
  • Ixia
  • Karamba Security
  • Kaspersky Lab
  • Kudelski Group
  • Lear Corporation
  • Levl Technologies
  • Lifelock
  • Link Motion
  • Lynx Software
  • Magna International
  • Marvell
  • Microchip
  • Micron
  • Micron Technologies
  • Microsoft
  • Mitsubishi Electric
  • Mocano
  • Mojio
  • NC4
  • NCC Group
  • Nexteer Automotive
  • Nominet
  • Northrop Grumman
  • Nozomi Networks
  • NRI Secure Technologies
  • NTT Security
  • NTU Singapore
  • NXP
  • Ohmio Automation
  • OnBoard Security
  • Palantir
  • Palo Alto Network
  • Panasonic
  • Pelephone
  • Phantom Auto
  • PSA Groupe
  • PureVPN
  • Qihoo 360
  • QNX
  • Qualcomm
  • Red Balloon
  • Regulus Cyber
  • Renesas
  • Renevo
  • Rohde & Schwarz Cyberseurity
  • SafeRide Technologies
  • Safran
  • Savari
  • Secunet AG
  • Secure Thinkz
  • SecureWorks
  • Security Innovation
  • Singtel
  • SonicWall
  • Sophos
  • Splunk
  • ST Engineering
  • STMicroelectronics
  • Symantec Corporation
  • Telekom
  • Tesla
  • Thales
  • ThreatHive
  • Tieto
  • Toyota
  • Trend Micro
  • Trillium
  • u blox
  • Upstream Security
  • Valeo
  • Vedecom
  • Verizon Enterprise
  • Visual Threats
  • Volkswagen
  • Webroot
  • Wind River
  • WISeKey
  • ZF
Note: Product cover images may vary from those shown