Keeping the Connected Car protected against Cyber attacks

Connectivity enables transformation but not without its risks. Sales of connected cars continue to grow and will reach an estimated 380 million vehicles by 2020. Protecting this increasingly complex connected car ecosystem can be a difficult task, especially as the proliferation of data across different connected devices makes them more vulnerable than ever before. Backed by extensive experience in traditional IT security and embedded security, HARMAN Automotive Cybersecurity offers end-to-end automotive cybersecurity services.

HARMAN SHIELD Solution – Enabling Threat detection and protection

HARMAN SHIELD is the most comprehensive Intrusion Detection and Prevention Solution (IDPS) to detect, manage, mitigate and respond to cyber-attacks on connected and autonomous vehicles, keeping vehicles safe and protected.

HARMAN SHIELD provides a modular scalable architecture and its key components include:
  • In-Vehicle Agents – embedded in and protecting key entry-points to critical assets, including TCUs, Head units, and central gateways. HARMAN SHIELD agents all employ HARMAN award-wining IDS technology and are equipped with full backend reporting capabilities and over-the-air updatability.


  • HARMAN SHIELD Smart Client – a centralized client-side orchestrator to provide smart aggregation of data and standard reporting to the backend. 


  • Cybersecurity Analytics Center – a full dashboard and analytics solution providing 24/7 visibility of broad vehicular security-related events from HARMAN SHIELD Agents, integrated on-top of HARMAN Ignite Platform.


  • API for 3rd party integrations – Import HARMAN SHIELD data into Security Operation Center (SoC), Security Incident and Event Management (SIEM) solutions.


Best Practices for Security-by-Design

HARMAN is a strong proponent of setting security along the full-cycle of automotive engineering, from design through manufacturing and through the deployment lifecycle of the vehicle. That is why we have defined the Secure Development Lifecycle (SDL), a common framework for implementing a security-by-design approach throughout the process of our development. HARMAN also provide consultancy services to OEMs, helping to shape security concepts and roadmaps, conduct comprehensive threat analysis methodologies, write security specifications and supporting various security innovation projects and Proof of Concepts (POCs) to help OEMs validate concepts and reduce risks of adopting new technologies. Our services include:


Security Concepts, Design and Engineering

  • Consult and actively participate in OEM’s design reviews; advice on mitigations and security solutions for potential threats


  • Evaluate alternatives and provide active advice and engineering support on building security solutions


Risk and Vulnerability Assessment

  • Execute Threat Analysis (TA) to identify which assets should be protected and against which specific threats


  • Conduct Vulnerability Assessments (VA) to expose potential vulnerabilities of systems


  • Recommend countermeasures and provide consulting services for the engineering of security solutions

Collaboration and engagement with industry bodies and government agencies

Defending against cyber-attacks often requires collaboration among multiple stakeholders to enhance cyber threat awareness and cyber-attack response. In order to effectively face the cybersecurity challenges, HARMAN engages with third parties, including peer organizations, suppliers, cybersecurity researchers, government agencies and other institutions. In addition, HARMAN is an active member of the Auto-ISAC, SAE/ISO & JASPAR organizations, in which define and deploy industry-wide best practices and standards. HARMAN is a co-founder of the International Cyber Security Smart Mobility Analysis and Research Test (SMART) Range in Israel, in cooperation with Ben-Gurion University of the Negev.



CES 2019, January 8-11 @ Las Vegas

Join us at CES 2019 in Las Vegas, from January 8-11 to experience the latest technology innovations that HARMAN Connected Services has to offer.

SAE Connected And Automated Vehicle Conference EVENT

SAE Connected And Automated Vehicle Conference

SAE International announces its inaugural conference in Israel on January 16-17, 2019.A joint effort of Tel Aviv University’s Shlomo Shmeltzer Institute for Smart...

Meetups @ HARMAN Israel EVENT

Meetups @ HARMAN Israel, December 20, 2018

For our inaugural Meetups @ HARMAN event, we'll be deep-diving into the concept of autonomous vehicles, looking into various aspects of this revolution, the challenges...



Find the latest news, blogs, videos and events here.

From 'Motor City' to 'Mobility City' NEWS

The New Detroit, from 'Motor City' to 'Mobility City'

Michigan is drawing on its deep roots as the historical center of the automotive industry to play a leading role in mobility's future.

Q&A with HARMAN’s Asaf Atzmon NEWS

Creating an ‘Auto’ Defense against Cyber Attacks: Q&A with HARMAN’s Asaf Atzmon

Asaf Atzmon begins National Cybersecurity Awareness Month by talking about the Evolving Automotive Cybersecurity Market.

Interview of Yuval INTERVIEW

Security must become part of basic vehicle design

"Harman is beginning to offer not just security for its own products, but also a clear foundation on which all automakers can build," said Yuval Weisglass, Vice...

Samsung subsidiary HARMAN sees Israel as key to autotech strategy NEWS

Samsung subsidiary HARMAN sees Israel as key to autotech strategy

Harman president and CEO Dinesh Paliwal inaugurates new 46,000-sq. ft. headquarters in Israel, home to new smart-car lab

Combating Cybersecurity Challenges in a Rapidly Evolving Automotive Landscape White Paper

Combating Cybersecurity Challenges in a Rapidly Evolving Automotive Landscape

The evolution and proliferation of connected and autonomous vehicles call for visionary cybersecurity practices. So, how do we achieve real-time intrusion detection and...



HARMAN Automotive Cybersecurity Demo at CES 2018

Security and the Connected Vehicle

Automotive data storage and handling—now in 2018, the future, the challenges, and the risks