We secure your vehicles’ built-in and connected software with renewable defense in depth, so you can protect your business’ revenue and brand.



Image of fleet of white rental cars


Image of trucks on highway

Heavy Vehicles


The hacking of vehicle software in the ECUs, telematics systems or even a connected mobile app can have far-reaching consequences for driver safety. And the cost to your business can be significant; think of leakage of IP or customer data, warranty issues, loss of revenue due to downtime, and damage to your brand.

Irdeto takes cybersecurity to the next level. It is designed for hostile environments such as vehicles where hackers can easily gain root access. It consists of several layers of code transformations, generated with a changeable seed, with added secure libraries, integrity validation, debugger disarming and file encryption. Irdeto’s defense in depth makes vehicle ECUs, Telematics systems and connected services virtually impossible to hack.

For over 50 years, Irdeto’s security technologies have been successfully applied across several industries including media, payments and automotive.

Irdeto logo

Secure your connected car: Exterior Features

Explore the security features of this connected car

Click here to view
interior features

Interior features

Access Control

Policy-based access

  • Lower overhead costs with lost or damaged physical keys
  • Multi-user control for families
  • Employee usage management for companies
  • Inventory operations and management for stores and fleets

New business models

Keyless entry and remote management allow for a variety of new business models like:

  • Car Sharing
  • Vehicle-as-a-Service (VaaS)
  • Remote Rentals

Enhanced anti-theft

  • Secured access from the ground up
  • No internet access required – works in underground parking garages or remote locations
  • Built into the car’s system
  • Zero-Day exploit safe


Renewable security drastically reduces attack surface

Cloakware uses multiple layers of code transformation, whitebox cryptography, integrity validation and other anti-hacking technologies to protect your telematics gateway and ECUs from hackers.

Completely secure OTA

By continuously monitoring hacking attempts and supporting a variety of OEM responses – like swapping code on the fly – all OTA hacking attempts will be fruitless and only the OEM's codes and application will run.

Zero false positives

  • Removes debugging capability and memory examination
  • Encrypts binaries and file content
  • Hides decryption keys
  • Makes reverse engineering virtually impossible
  • Collects security incident data for post-mortem analysis
  • Disables execution of anything except OEM authorized software


Selective trunk access

  • Limits or grants access to valuable items
  • Enables novel applications like secure package delivery

Convenience and security

  • Configure doors and/or trunk to open when approaching the car
  • Two-factor authentication ensures the highest security
  • Enforce timed restrictions

Secure your connected car: Interior Features

Explore the security features of this connected car

Click here to view
exterior features

Exterior features

In-Vehicle Infotainment

Secured environment

  • Security built into all applications and updates
  • Only OEM authorized software can run
  • Secured personal information
  • Complete protection for the ECU and other connected sub-systems

Encrypted communications

  • Prevent malicious code insertion
  • Completely secured cloud services
  • Reliable fleet management
  • Support insurance claims

Performance Restrictions

Example: Valet mode

  • Limits speed to 50Km/h
  • Revokes trunk, glovebox and fuel cap access
  • Limits range to 5Km

Example: Teenager mode

  • Limits radio volume to 50%
  • Weekend use only
  • Limits speed to 80Km/h
  • Geo-fence to 25Km from home

Example: Borrow mode

  • Access expires automatically after 2 days
  • Limits speed to 100Km/h

Convenience Features


  • Full control of car settings, geo-fencing, speed limits and more
  • Simply walk up to the car and it will unlock and load your preferences
  • Associate preferences to each user
  • Seat position, steering wheel distance, radio station and volume, mirrors and much more can be adjusted
Years experience in hostile environments
5 Billion
Devices protected
Patents (+ 285 pending)
Continents where Cloakware is deployed

Some of our Partners and Customers

SafeRide technologies logoQNX logoDSA

Industry Alliances

Automotive Grade LinuxGeniviCar Connectivity ConsortiumJasParAutosar

Our Products

Security Services

Software Protection

Secure Environment


View all resources >