This report includes an overview of technologies and trends that influence the market for automotive cybersecurity, including vehicle-to-everything communication, payment by car, infotainment system capabilities, open source architectures and operating systems, and other industry software initiatives and advancements.
Table of Contents
Introduction: The Risk of Convenience
- Software-defined Flexibility Exposes Automotive Architectures
- CANbus Entry
- Early Remote Hacks
- SiriusXM Breach
- Connectivity Invites Opportunity & Risk
- V2X
- Payment by Car
- Apps & APIs
- Incentives for Hackers
- The Rise of Open Source & Open Architecture
- AUTOSAR & SOAFEE
- Automotive Grade Linux & Android Automotive
- Automotive Cybersecurity Categories
Global Market Overview
Regulations Drive Growth
- UN WP.29
- Member Countries
- Timeline
- R155
- R156
- ISO/SAE 21434
- The Future of Regulations
Regional Analysis
- Future of the United States
- Future of China
End User Insights
- Industry Adaptation to Security Requirements
- Implementation of Embedded Security Hardware, Software, & FOTA Software
- The Future of Automotive Technology
Vendor Landscape
- BlackBerry
- Bosch
- Continental
- Green Hills Software
- Irdeto
- Karamba Security
- Kaspersky
- Samsung
- Sonatus
- Thales
- Trend Micro
- Upstream
- Utimaco
- Vector Informatik
About VDC Research
Report Exhibits
- Exhibit 1: Sample Table of Vendors Offering Automotive Cybersecurity Solutions
- Exhibit 2: Global Revenue of Automotive Cybersecurity Software & Services
- Exhibit 3: Revenue for Automotive Cybersecurity Software & Services by Product Category
- Exhibit 4: Global Revenue for Automotive Cybersecurity and Software, 2022-2027, Segmented by Product Category
- Exhibit 5: Global Revenue for Automotive Cybersecurity Software & Services by Geographic Region
- Exhibit 6: Global Revenue of Automotive Cybersecurity Software & Services by Geographic Region, 2022 & 2027, Segmented by Geographic Region
- Exhibit 7: Actions Taken by Respondents Organization in Response to Security Requirements
- Exhibit 8: Current Major Competition in the Connected and Autonomous Vehicle Space
- Exhibit 9: Use of Embedded Security Software, Hardware, Firmware-Over-the-Air Updating, and PKI in Current Projects
- Exhibit 10: Technologies Automotive Respondent's Organization is Most Interested in and/or Building for Future Customers