The revolution of the automotive industry

0 M

connected cars will be on the roads by 2020

0 GB

of data will be generated by an autonomous vehicle every 90 minutes

0 %

of today’s car owners will replace it with shared vehicles

0 %

market share of electric cars in 2030

Our approach

Enigmatos focuses on protecting fleets from malicious cyber activity as well as offering valuable insights on the vehicle’s operational efficiency and safety.  

By Applying our unique technology – the DCIP (Deep Car Identity Profiling™) – Enigmatos is the first company to extract the vehicle’s unique digital profile without the need for any prior information about the vehicle. We analyze the exact signature of every message on the vehicle’s communication network, any computer on the network and identify the vehicle’s unique topology. We protect the vehicle by allowing only valid and legal changes to the vehicle’s profile.

Watch our video

Solution

A vehicle is a complicated network of computers on the move when connectivity adds various attack surfaces and attack vectors. Enigmatos protects vehicles and fleets from malicious cyber activity regardless of the attack surface or vector. Our solution instantaneously detects, analyses and alerts on any anomaly in the vehicle’s communication network.  It offers 100% visibility into the vehicle’s communication network as well as a fleet wide view, accurately detects the origin of each cyber attack, protects existing and future vehicles and can be smoothly integrated with various vehicle architectures.

Our services

Enigmatos offers its customers variety of consulting services in the domain of automotive cyber security. Our top notch team of cyber security researchers and automotive experts harness their unique set of skills to challenge our customers’ infrastructure and vehicle’s architecture in order to assist them in building robust and secure vehicles.

Events

Automotive World Japan, 16-18 January 2019, Tokyo, Japan
We are proud to take part in the Israeli Pavilion in the exhibition – orchestrated by The Israeli Export Institute. You can meet our team and see our demo – How we attack and protect a vehicle in our lab – 9,000 Km away from Tokyo!
Cybertech TLV, January 28 – 30, 2019, Tel Aviv, Israel
Meet us at the startup area in Pavilion 2, Tel Aviv Fairgrounds, for the Cybertech TLV 2019. Watch out product demo and meet the Enigmatos team.
Ecomotion 7th Main Event, 11 June 2019, Tel Aviv, Israel
We are excited to take part in the most important event of the Israeli Auto Tech industry. Meet our team and come to see our demo at our stand in the exhibition area. Come hear our pitch at the Capsula accelerator event!
Cybertech Global TLV, January 28 – 30, 2020, Tel Aviv, Israel
Come over to Expo TLV and visit our stand at the startup area of the Cybertech Global TLV event.  Watch our product demo and meet the Enigmatos team.

The Enigmatos Advantage

100% visibility of vehicle's data

We upload all of the vehicle’s communication data to the cloud and apply our machine learning algorithms to generate the unique signature of each message, each ECU & identify the vehicle’s unique topology. We can then detect and prevent in real time any anomaly on the vehicle’s communication network.

Detect the source of the cyber-attack

Our patent pending solution allows us to analyze each message, detect its source and understand its context. We allow only legal and valid messages, initiated through the ECU that is eligible to send them. This is why we can easily pinpoint the source of the cyber-attack and identify the compromised ECU.

Protecting maintenance infrastructure

We at Enigmatos look at the bigger picture. In order to better protect vehicles we need to make sure that their maintenance ecosystem is protected as well and that its integrity is intact. Our ability to create a vehicle’s unique signature also provides us the means to create the required trust relationship between the vehicle and its maintenance ecosystem.

Forensic analysis

We investigate any event in the vehicle or a fleet of vehicles. All detected attack attempts are reported to the cloud for further forensic analysis by Security Operation Center (SOC) team. Our SOC team members use our proprietary analysis tools for further forensic investigation of the alarms and detection of patterns of massive threats. All detected events and the findings of our analysis are also reported to the OEM’s/Fleet operator’s SOC with the ability to provide the appropriate response.

Frequent policy update

A cyber solution needs to stay ahead of the hackers. The ability to update our detection policy based on new attacks discovered is essential to ensure the continuous safety of your vehicle. We use the inputs of our anomaly analysis and forensic analysis to update the detection policy of our in car rules engine.

Unique company DNA

Enigmatos founders believe the secret for success lies in the formation of a team of the top experts in cyber security, the automotive field (CAN BUS protocols, Ethernet, LIN BUS, FLEXRAY, etc. ), cloud management, algorithm development, Big Data analysis, statistics, electronics, communications, etc.  This extraordinary team of highly experienced engineers and scientists is the key to devising our cutting edge technology solution.

Latest Resources

  • Fuzzlon
    Fuzzlon – Dumb 802.15.4 Fuzzer Enigmatos researches interesting attack-vectors that may hinder vehicles’ security and safety. Recently, as part of our ongoing research, we investigated a peculiar CAN-connected device which has an external radio [...]
    Read more

Contact Us

Tel: +972-8-9322288

Address:
13 Gan Rave Blvd., Yavne
8122214, Israel

Email: info@enigmatos.com


Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.