drivesec offers a variety of services, covering both the Design and the Operation phases of development.

Secure by Design Secure HW/SW Design System V alidation and T esting E-learning Penetration T est Process Re-design Threat modelling and System V ulnerability assessment Consulting on Regulation and standards

Consulting on regulations and standards

drivesec facilitates Customers to be compliant with new cybersecurity regulations.
Main focus on Automotive World, with deep experience on UNECE R155, UNECE R156 and ISO 21434, now mandatory for new model type approval.
Both processes and products are deeply analyzed to become compliant with standard and requirements, supporting the customer in reports preparation.

Threat modelling and System Vulnerability assessment

drivesec is able to support the customer in the Risk Assessment Evaluation, starting from the identification of threats to the new systems and product requirements.
A system vulnerability assessment could be done for legacy products, checking the cyber level status and supporting a possible design mitigation to achieve the new standard requirements.

Secure HW/SW Design

drivesec supports all design phases from requirements definition and architecture design to security SW development based on the customer specifications, including solutions as Secure Boot, HW Trust Anchor (HTA), HW Security Module (HSM), Cryptolibrary.
The SW Code analysis is part of drivesec competences, in order to verify its compliance with secure coding best practices.

System Validation and Testing

drivesec provides testing of product requirements and cybersecurity countermeasures during HW/SW validation phase.
Weseth is the new drivesec remote testing platform to support this development phase.

Weseth

Process re-design

The future industrial landscape encourages technology solutions that are always connected to online infrastructures and Cloud services.
It is clear that in a similar scenario cybersecurity is paramount and an essential requirement.
drivesec can help companies analyze and redefine their processes according to the upcoming changes in regulations.

Penetration Test

Penetration testing of Internet of Things products to evaluate the attack resilience of the device.
Our testing services range from application and communication protocol to embedded hardware and software used into the product, using the most advanced hacking techniques.