
FAQ
-
What type of companies can benefit from Upstream's Automotive Fleet Cybersecurity platform?
Connected vehicle service providers, telematic companies, OEMs and after-market connected fleets such as car sharing, car leasing, car rental and commercial fleets which manage their own telematics or have an API access to the telematics information.
-
Which team members can benefit from using Upstream's Automotive Fleet Cybersecurity platform?
IT, Operation and Security teams and even C-level executives that wish to explore their fleet security health.
-
Do I need to install any hardware or software inside the vehicle for your Automotive Cybersecurity platform to work?
Upstream requires zero hardware installation and the solution is 100% cloud-based and non-intrusive. You gain insights on the data that your connected fleet is already collecting.
-
How does Upstream’s solution differ from in-vehicle security solutions?
In-vehicle solutions are typically focused on securing single vehicles - Upstream's Automotive Cybersecurity platform provides you with visibility of your entire fleet, individual vehicles as well as your data center at the demarcation point of IT and OT. Furthermore, in-vehicle solutions usually serve vehicle manufacturers and future vehicles. Our solution serves these markets as well as after-market connected fleets already on the road today. Lastly, our solution does not require any in-vehicle hardware or software installation, making deployment easier and non-intrusive,
-
How do you differ from other data center security solutions?
Data center security solutions such as firewalls inspect the networking traffic (TCP/IP), and some can inspect application level information. These solutions do not “understand” telematics protocols nor can they detect exploits or anomalies in these protocols or threats coming from these communication channels. Additionally they do not understand fleet and driver behaviors, two vectors that are critical in order to secure the new enterprise known as fleets.
-
What type of data do you collect?
We collect, aggregate and analyze any data related to the fleet’s communications such as messages sent from vehicles to the telematic servers, server commands sent from the telematics server to vehicles and mobile app communication to and from the application servers. Our Automotive Cybersecurity Collection Engine aggregates all these communications and learn their patterns automatically.
-
Which telematics protocols can you support?
We support many different proprietary telematics protocols of different connected services manufacturers and vendors. To find out if we support the protocol used in your fleet please contact us.
-
We use several different telematics protocols in our fleet. How would your platform handle that?
One of the greatest benefits of our Automotive Cybersecurity Platform is that it can collect data from multiple sources and different protocols and normalize it so that it is shown unified in our platform.
-
What is your pricing model?
The Automotive Cybersecurity service is charged per vehicle on a monthly basis. The price is dependent on the service. Contact us for a quote.
-
Who owns the data you collect?
The data is owned and belongs to your fleet. We will never share it with 3rd parties without permission.
-
Do you collect and store private information about drivers/fleets/vehicles?
Upstream recognizes the sensitivity of fleet data. All uploading and storing is strictly maintained private and safe. All fleet data is encrypted prior to uploading and anonymized and stored at the highest level of security and privacy
-