OnBoard Security named a Top 10 Cyber Security Solutions Provider
WILMINGTON, MA DECEMBER 8, 2017
OnBoard Security™ today announced that it was selected as a Top 10 Cyber Security Solutions Provider by The Technology Headlines. This honor recognizes OnBoard Security’s leadership in Trusted Computing and Connected Car cyber security.
"This year has been a very eventful one," says OnBoard Security President Peter Samson. " beginning with our separation from Security Innovation, the deployment of our Aerolink® security in the first commercial V2X-enabled car, the Cadillac CTS, and culminating with the launch of TrustSentinel TSS 2.0, the first commercially available Trusted Platform Module middleware. It has been a year of growth and we are pleased that our expertise has been recognized by the selection team at The Technology Headlines.”
“We are delighted to honor OnBoard Security among the top 10 companies that are featured in the Cyber Security 2017, a special edition of The Technology Headlines,” says Carlos Chavez, Managing Editor, The Technology Headlines. “Though several service providers have been on our radar for a quite long time, this year it became clear that Onboard Security’s service and product standards have set a benchmark for the Vehicle -to-Vehicle communications security, trusted computing, and cryptography markets.”
This is not the only award for OnBoard Security over the past couple of years. Its Aerolink V2X security library won TU Automotive’s Best Cyber Security Product in 2016, and its engineers have won Key Contributor of the Year awards from the Trusted Computing Group for the past two years.
About OnBoard Security
OnBoard Security was created to help automotive and IoT organizations stay ahead of the curve through superior cybersecurity. For over 10 years, the world-renowned experts at OnBoard Security have been pioneering technologies that protect the Internet of Things, now and for the future. We address three significant challenges; ensuring the security and privacy of connected vehicles, making hardware roots of trust easy to use, and avoiding the existential threat from quantum computers to the integrity of the internet.