Your contacts for IT Security in Products
Michael Happ
Head of Cyber Security
Sebastian Befeld
Head of Business Area
Secure your systems against potential hacker attacks!
IT Security in Products
In today's digitally networked world, there are very few products without a digital interface to their environment. Most products are part of a network, a system of systems. In addition to various advantages (increased functionality, greater convenience, etc.), such distributed systems also entail new risks. In order to develop an all-round secure product, the risks of the digital interfaces must be identified and the entire system must be protected against potential hacker attacks. In addition, this topic is part of numerous standards and regulations, such as UNECE WP29, whose requirements must be met in order to successfully launch a product on the market.
The terms safety and security are ubiquitous in product development. In practice, however, there is a lack of a clear distinction between the terms. The term safety focuses on accident prevention and maintaining the health of stakeholders (users, maintenance staff, passers-by, etc.), while "security" considers crime prevention issues and thus only allows authorized persons access to a location or system. The following example illustrates this connection. One of the functions of a vehicle door is to prevent another vehicle from entering the vehicle interior in the event of a crash (safety). Furthermore, the door also protects against strangers being denied access to the vehicle in order to make potential theft more difficult (security). Due to digitalization in particular, the topic of product cyber security also revolves around data security. A holistic security approach not only takes into account the individual control units, data networks and external interfaces (e.g. Bluetooth, WiFi), but also end-2-end security of the entire system, i.e. including the cloud (see shell model).
Our Consulting Services in IT Security in Products
Your challenges:
UNITY solution approach:
Your challenges:
UNITY solution approach:
Your challenges:
UNITY solution approach:
Make an appointment with our experts
Depending on the topic, we provide you with the right experts. Select your preferred date from our calendar and discuss your concerns with our experts by phone or via Microsoft Teams without any obligation. We look forward to getting to know you!
Project stories in Cyber Security
Head of Cyber Security
Head of Business Area