Overview
AutoThreat® PRO solution includes deep and dark web investigations, as well as tailored-made cyber threat intelligence to provide any organization visibility to the Mobility Cyber Threat Intelligence with Curated Intelligence via the AutoThreat® PRO mobility CTI platform. With Upstream AutoThreat® PRO, organizations can assess and manage risks detected in their supply chain, comply with cybersecurity and product intelligence, standards and regulations, and act by enhancing their security defenses. AutoThreat® PRO proactively addresses emerging threats with Deep and Dark Web Intelligence and delivers visibility, intelligence, and recommendations essential to managing cyber risks for connected mobility systems:
- Mobility Cyber Threat Intelligence combines vulnerability intelligence with automotive-specific exploit research. It leverages hundreds of deep, dark, and clear web sources to uncover vulnerabilities and exploits. The scope spans across both on-board and off-board systems: on-board intelligence includes findings related to in-vehicle tampering of connected products such as IVI jailbreaks or TCU rooting; whereas off-board intelligence expands to external and third-party vulnerabilities, including unauthorized access to vehicle data and controls via diagnostic tools or mobile app tampering.
- Curated Intelligence (HUMINT) allows stakeholders to leverage Upstream robust intelligence collection infrastructure to safely and anonymously interact on the deep and dark web and expand intelligence collection. Expert cyber threat intelligence analysts at Upstream are deeply familiar with the automotive and smart mobility ecosystem, equipping them with unique capabilities to provide insights into threat actor motivations and effective mitigation recommendations.
- The Mobility CTI Platform provides access to all findings and intelligence. The platform correlates insights with UNECE R155 (Annex 5), MITRE, and ATM framework of AutoISAC. Upstream automotive risk matrix and customer-specific risk scoring allow stakeholders to contextually analyze threats and gain a clear view of the threat landscape. Threat actor engagement is also integrated into the platform, providing deep insights into the impact of threat actor activities. The platform empowers security teams to perform effective investigations, track the status of each finding and drill down into the details. Mobility intelligence can be accessed through the AutoThreat® PRO platform or integrated into ticketing and automated workflows in vSOC, PsOC, PSIRTS and more.
- AutoThreat® PRO Threat Actor Repository: AutoThreat® offers access to a proprietary repository of mobility-specific threat actors. This repository provides detailed profiles based on the actors, regions, and tactics most relevant to your assets and concerns, offering tailored insights beyond generic threat actor profiles.
- Empower Cross-Organizational Awareness and Regulatory Compliance AutoThreat® PRO is designed to provide intelligence findings to help stakeholders effectively communicate threats and execute informed mitigation strategies.
- Map Findings to Regulations: AutoThreat® PRO links specific threat findings to relevant automotive, privacy, and IoT regulations, supporting risk assessment and simplifying audit preparation by demonstrating adherence to compliance requirements.
- Public Automotive Cyber Incident Database: AutoThreat® provides a comprehensive repository of all publicly-reported automotive and mobility-related cyber incidents, utilizing clear web resources.
- Generate Cross-Organizational Awareness: With AutoThreat® PRO, teams can export detailed intelligence reports that spotlight critical threats to product, brand, and reputation.
Highlights
- AutoThreat® PRO is the first mobility-specific cyber threat intelligence solution. It is purpose-built to collect, analyze, and leverage mobility threat intelligence from multiple clear, deep and dark web sources, increasing mobility threat landscape visibility and enabling stakeholders to gain domain-specific context of cyber threats that impact their products and supply chain.
- Our Mobility CTI leverages hundreds of deep, dark, and clear web sources to dleiver access to Vulnerability intelligence with automotive-specific exploit, On-board CTI to uncover in-vehicle tampering of connected products and Off-board CTI to reveal supply chain vulneriblites affecting you products. Our CTI Platform provides access to all inelligence and correlates insights with UNECE R155 (Annex 5), MITRE, and ATM framework of AutoISAC.
- IMPORTANT: For Automotive OEM or any sales-related inquiries please contact sales-aws-MP@upstream.auto
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
AutoThreat PRO | By subscribing you are not purchasing but requesting more information | $0.01 |
Vendor refund policy
Refunds are not available for customers who have accepted a Private Offer to purchase AutoThreat PRO.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Please contact sales-aws-MP@upstream.auto
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products


