Cyber security is a hot topic these days. The number of cyberattacks and the extent of cybercrime and cyber espionage has increased dramatically in recent years. Hackers are carrying out attacks that are not just diverse and complex but also make their identities difficult to trace. Not to mention the large-scale damage caused as a result of such attacks. Companies, in particular, have become the target of hackers. The growing trend of digitalization and connectivity of business processes has increased companies’ vulnerability to such attacks, while new and complex IT architectures and software systems have given rise to a steady stream of new attack vectors. Cyberattacks on large corporations and their value chains are therefore no longer a question of time, but rather a question of the extent of damage caused by such attacks. The conventional approach of using standard preventative measures such as firewalls, intrusion detection systems (IDS), and antivirus protection is proving more and more ineffective in this environment. The situation thus calls for additional detection and prevention measures.
As part of ESCRYPT’s cyber security solutions, the Cyber Defense Center (CDC) uses a holistic approach that effectively combines prevention, detection, and reaction methods to recognize and prevent cyberattacks at an early stage. In addition to preventative security measures, the CDC specifically identifies critical behavior patterns and incidents that indicate a potential cyberattack and then initiates countermeasures ahead of time. To this end, the CDC specialists collect large amounts of data and evaluate it in real time using modern data analytics. Vulnerability management, for example, can help the prevention process by identifying and remedying security-relevant vulnerabilities in software and IT systems at an early stage before they are exploited by hackers. Other components of ESCRYPT’s security solutions include penetration tests for IT systems, applications and products, as well as risk and threat analyses that are created as part of cloud service evaluation processes for example.
If the CDC team detects anomalies or cyberattacks, it reacts by initiating countermeasures. It pools associates, technologies, and activities as part of a security incident response process to actively combat such cyberattacks. These emergency response teams (CERT and PSIRT) currently protect the entire Bosch Group, ensuring that connected products and devices operate securely, value chains are not compromised, and company assets are not damaged.