Kondukto and ETAS Developing Joint Cybersecurity Solution for the Automotive Industry
LAS VEGAS--(BUSINESS WIRE)-- Kondukto Inc., a leading Application Security Orchestration & Posture Management platform, today announced a strategic partnership with ETAS GmbH. This collaboration aims to deliver a comprehensive security orchestration solution specifically designed for software-defined vehicles.
ETAS GmbH, a wholly owned subsidiary of Robert Bosch GmbH, is a key player in automotive cybersecurity and a pioneer in software-defined vehicle technology. As vehicles increasingly rely on software, there is a heightened need for robust protection against cyber threats and unauthorized access.
By integrating Kondukto’s advanced Application Security Posture Management (ASPM) and vulnerability management solutions, ETAS enhances its cybersecurity offerings. This partnership will provide ETAS’ automotive OEM partners with superior visibility into their software supply chains, enabling more effective risk assessment and improved security measures. ETAS customers will also benefit from cutting-edge security automation and contextual decision-making tools, leading to quicker remediation and enhanced code quality across the board.
Dr. Moritz Minzlaff, Head of Professional Security Services at ETAS, emphasized, “The collaboration with Kondukto brings a novel security posture management system to the automotive industry, benefiting development teams with enhanced security solutions.”
Kondukto API v3: Enhanced Custom Integrations
Kondukto’s API has been instrumental for enterprise clients in various sectors, including finance, healthcare, manufacturing, and software, by automating application security workflows and managing security posture at scale. The upcoming v3 API will introduce expanded features, including advanced reporting, auditing, software-bill-of-material (SBOM) management, and AI-driven remediation:
-
Reporting: New extended exports with normalized data for creating custom, tailored reports.
-
Auditing: Detailed event access and robust authorization management, with comprehensive audit logs for clear audit trails.
-
Automation: Customizable automation rules for efficient scan scheduling, vulnerability triage, and high-priority configuration.
-
SBOM: Detailed SBOM scan scheduling and reporting, with per-branch component and license information, and multiple export formats for SBOM reports.