ThreatZ - Automotive CSMS Platform for Tier-1 Suppliers

ThreatZ is an AI-powered automotive cybersecurity management system (CSMS) for Tier-1 suppliers, ECU manufacturers, and software providers. It unifies TARA, SBOM, vulnerabilities, and incidents in one platform, allowing you to demonstrate ISO 21434 and UNECE R155 compliance across all OEM programs.

Stop managing cybersecurity in Excel, portals and scattered tools. ThreatZ gives you one graph-based CSMS that scales with modern vehicle architectures and supply chains.

Integrates with your engineering toolchain

Powered by leading vulnerability & threat feeds

Who Uses the ThreatZ Automotive CSMS Platform?

ThreatZ is built for companies in the automotive supply chain that must run a reliable cybersecurity management system (CSMS) and prove ISO 21434 / UNECE R155 compliance to multiple OEMs.
These are the teams that benefit most:

Tier-1 System & ECU Suppliers

Teams responsible for complete ECU platforms, domain controllers, and vehicle systems delivered to several OEMs.

Software & Middleware Providers

Teams developing software platforms, middleware and libraries that end up in ECUs for multiple customers.

OEM Cybersecurity & CSMS Teams

Central cyber teams at OEMs coordinating CSMS processes and supplier security across projects and regions.

One Knowledge Graph for TARA, SBOM, Vulnerabilities and Incidents

ThreatZ connects system models, TARA, SBOM, vulnerabilities, controls, tests, and incidents in a single automotive cybersecurity knowledge graph. Every element is linked, so you always know what is affected and why.

Unified Automotive CSMS Graph

Model items, ECUs, software components, assets, threats, risks, controls, and incidents as connected nodes in one graph.

AI-Assisted Automotive Threat Modelling

Use an AI assistant trained on automotive cybersecurity patterns to accelerate your work.

OEM–Supplier Collaboration at Scale

Keep one internal CSMS, serve many OEMs.

ThreatZ CSMS Modules and Licenses

ThreatZ is modular. Start with Foundation + TARA to structure your CSMS, then add BOM & Supply Chain and Operations when you’re ready to manage vulnerabilities and incidents in the same platform.

Cybersecurity Governance Backbone

Foundation

Monitoring, Incidents and Continuous Cybersecurity

Operations

TARA

Automotive Threat Analysis and Risk Assessment

BOM & Supply Chain

SBOM and Vulnerability Management

Core Modules in ThreatZ

9

Policy Manager

A governance engine — it defines what is allowed, disallowed, or mandatory in your projects. Policies set the rules for accepted risk treatments, control requirements, or reporting standards, ensuring every program complies with ISO 21434 and UNECE R155 expectations.

Sentrax

Security Catalog

A knowledge library — it stores reusable security assets like threats, risks, goals, controls, claims, checklists, and report templates. The catalog ensures consistency, accelerates TARA, and helps teams avoid reinventing the wheel for every project.

8

System Modeling

A structured workspace — capture architectures, assets, interfaces, and CALs to define your cybersecurity baseline. This creates the foundation for consistent threat analysis and compliance traceability.

4

Reports & Compliance

An audit engine - generate, version, and export ISO 21434 and UNECE R155 reports. Automated history and templates make compliance faster and repeatable.

TARA | VxLabs

Threat Modeling

A guided approach — identify potential Damage Scenarios, Threat scenarios and attack paths using structured libraries and reusable scenarios. This accelerates analysis while ensuring coverage against evolving threats.

3

Monitoring & Incidents

An operational view — ingest VSOC/XDR data, monitor incidents, and correlate findings back to risks and assets. Integrated threat intelligence and audit-ready reports streamline monitoring and response.

Risk heat map | ThreatZ

Risk Assessment

A scoring engine — evaluate and prioritize risks with ISO 21434-aligned TARA workflows, vulnerabilities, and real incidents. Every decision is traceable from asset to control, supporting audit readiness.

5

BOM & Supply Chain

A governance hub — track software components, suppliers, licenses, and vulnerabilities through SBOM management with CycloneDX/SPDX support. AI-powered analytics highlight deltas and help prioritize vulnerabilities across open source and third-party components.

aechitest

Risk Treatment

A mitigation framework — define goals, assign controls, and document treatments for identified risks. This ensures risks are managed consistently across projects.

12

Validation & Testing

An assurance layer — link risks and controls directly to verification activities. This provides evidence of coverage and builds confidence for internal and external audits.

Uraeus AI Assistant for Automotive Cybersecurity

Embedded across TARA, SBOM, and incident workflows – not “yet another assistant window”.

 

Mitigation Recommendations

AI-driven countermeasures and controls based on best practices, Auto-ISAC guidance, and proven patterns, with built-in implementation tips.

Interactive Security Chatbot

Ask questions in natural language and get instant guidance on project context, best practices, and compliance needs.

By incorporating AI capabilities, ThreatZ significantly reduces the time required for comprehensive security analysis while improving the quality and consistency of security measures across projects. The system continuously learns from new threats and mitigations, ensuring that security knowledge remains current in the rapidly evolving automotive cybersecurity landscape.

AI

Deployment Options and Security

Private Cloud

Dedicated instance within a customer-controlled cloud environment, offering enhanced data sovereignty.

Cloud SaaS

Fully managed deployment with automatic updates, scalable resources, and enterprise-grade security

On-Premises

Deployment in your data center for strict residency or air gapped environments.

Licensing and Growth Path for ThreatZ

ThreatZ uses a named-user, annual subscription model. Start small with a pilot, then scale to a full enterprise CSMS deployment using the same platform.

Starter

Pilot your ISO 21434 CSMS with one team

up to 5 Users
  • Foundation + TARA modules
  • One Project or ECU platform

    Manage items, assets, threats, risks and work products in a single CSMS

  • Support Legacy project

    Standard Excel/CSV import & export for legacy data

  • Uraeus AI Agents

    Embedded AI assistants that suggest threats, risks, mitigations and next actions directly inside your TARA, SBOM and incident workflows.

  • Report sharing

    Instantly generate ISO 21434 / UNECE R155 reports and share them with OEMs and internal teams from one secure CSMS workspace.

  • Support

    Email support and online knowledge base

Pro

Department-level CSMS with TARA + SBOM

up to 20 Users
  • Foundation + TARA + SBOM
  • Multiple OEM programs

    Designed for multiple OEM programs within one business unit

  • CVEs, licenses and suppliers

    Track vulnerabilities, CVEs, licenses and suppliers in one place

  • Extended integrations

    Extended integrations with architecture / ALM tools (EA, Polarion, JIRA, etc.)

  • Report templates

    Customizable report templates for ISO 21434 and UNECE R155 work products

  • Onboarding

    Priority email + scheduled onboarding sessions

Enterprise

Full automotive CSMS across TARA, SBOM & Ops

from 21 Users
  • On-premise

    Flexible deployment models: SaaS, private cloud or on-premise / air-gapped

  • Foundation + TARA + SBOM + OPS
  • Full Integration

    Adaptor for all connections

  • Architest Testing

    Validate controls with ArchiTest automated test suites and sync results into ThreatZ.

  • Multi XDR Integrations

    Advanced integration & API options for portals, SOC/SIEM and CI/CD

  • Dedicated customer success

    Dedicated customer success, SLAs and strategic roadmap alignment

Pair ThreatZ with…

Services — Implementation & Compliance

Architect TARA & security concepts, implement controls, validate & pen-test, and ship audit-ready CSMS/SUMS evidence. We also tune ThreatZ detections and runbooks to your fleet.

SentraX — Sensors & IDPS (FleetDetect)

Deploy in-vehicle sensors and FleetDetect rules for AUTOSAR Classic/Adaptive and Linux/HPC. Normalized telemetry feeds ThreatZ for correlation, triage, and OTA-safe response.

FAQs…

What is ThreatZ and who is it for?

ThreatZ is an automotive CSMS platform built for Tier-1 suppliers, ECU manufacturers and automotive software providers. It centralizes TARA, SBOM, vulnerabilities, incidents and compliance reports in one place. This helps suppliers manage cybersecurity across multiple OEM programs and prove ISO 21434 / UNECE R155 compliance with far less manual effort.

How does ThreatZ help with ISO 21434 and UNECE R155 compliance?

ThreatZ structures your threat analysis and risk assessment (TARA), links it to security goals, requirements and controls, and stores all evidence in a traceable CSMS. It includes report templates for ISO 21434 work products and UNECE R155 documentation, so you can generate consistent reports per project. Because TARA, SBOM, incidents and tests are all linked, auditors can easily follow the full cybersecurity trail.

What is the difference between Starter, Pro and Enterprise licenses?

The Starter license is for pilots and single product lines, and includes the Foundation + TARA modules. Pro adds the full BOM & Supply Chain module for SBOM and vulnerability management across several OEM programs. Enterprise includes all modules, including Operations, and is designed for full CSMS deployments with advanced integrations, flexible deployment options and dedicated support.

Can ThreatZ integrate with our existing OEM CSMS portal and engineering tools?

Yes. ThreatZ is designed to co-exist with OEM portals and internal tools, not replace them. It integrates with common architecture and ALM tools (such as Enterprise Architect, Simulink, Polarion, PTC, JIRA) and test environments like CANoe and ECU-Test. Through REST APIs, webhooks and exports, ThreatZ can act as the knowledge graph backend while your existing portals remain the user-facing front-end.

How does ThreatZ handle SBOM and vulnerability management for automotive software?

With the BOM & Supply Chain module, ThreatZ manages SBOMs per ECU, software product and vehicle platform, including dependencies and versions. It ingests vulnerability data from sources like NVD, OSV and CISA, maps CVEs to your components and links them to risks, mitigations and suppliers. This gives you an automotive-focused SBOM and vulnerability management solution directly inside your CSMS.

What deployment options are available for ThreatZ?

ThreatZ supports SaaS (cloud-hosted), private cloud and on-premise / air-gapped deployments. SaaS is best for fast rollout with managed infrastructure. Private cloud lets you run ThreatZ in your own Azure/AWS/GCP environment under your security policies. On-premise and air-gapped options are tailored for highly sensitive or regulated automotive projects that require full control over data.

We already built an internal CSMS. Does it still make sense to use ThreatZ?

Yes. Many automotive companies already have internal CSMS portals or workflows. ThreatZ can sit behind these systems as the central cybersecurity knowledge graph, connecting TARA, SBOM, vulnerabilities and incidents. This lets you keep your existing processes and UI, while replacing fragile spreadsheets and custom scripts with a robust platform that scales across OEMs and programs.

How long does it take to get started with a ThreatZ pilot?

Most customers can start a ThreatZ Starter pilot in a few weeks. We typically begin with one product line or ECU, migrate existing TARA or SBOM data, and configure templates to match your OEM and ISO 21434 requirements. From there, teams usually reach a first “aha moment” within a few TARA sessions, once they see everything linked in a single CSMS.
lower cost of ownership

We reduce total ownership costs through efficient, reliable solutions that deliver long-term value.

Maintain trust

Build and preserve customer confidence by demonstrating your commitment to protecting their data.

Prevent Financial Loss

Avoid costly data breaches and system downtime that can impact your bottom line.

Ensure Compliance

Meet regulatory requirements and industry standards for data protection and privacy.

Benefits to our Customers

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

General Notice

We prepare the content on this website with great care and to the best of our knowledge. Nevertheless, we do not assume any liability for the timeliness, completeness, or accuracy of the information provided.

Limitation of liability for internal content

As a service provider, we are responsible for our own content on these pages under applicable German law. However, we are not obligated to monitor transmitted or stored third-party information or to investigate circumstances indicating unlawful activity. Obligations to remove or block the use of information under general laws remain unaffected. Any liability in this respect is only possible from the time we become aware of a specific legal violation. Upon notification of such violations, we will remove the content immediately.

Limitation of liability for external links

This website contains links to third-party websites (“external links”). We have no control over their content; therefore, we assume no liability for such external content. The respective provider or operator of the linked pages is always responsible for their content. At the time of linking, no legal infringements were recognizable to us. If we become aware of any legal violations, we will remove such links without delay.

Copyright

All content and works on this website are subject to German copyright law. Any reproduction, editing, distribution, or any kind of use beyond what is permitted by copyright requires the prior written consent of the respective author or rights holder. Downloads and copies are permitted only for private, non-commercial use unless otherwise stated.

Data Protection

Visiting our website may result in the storage of access information on our server (e.g., date, time, and page viewed). This data is not personal and does not identify you. If personal data (such as name, address, or email) is collected, this is done—where possible—only with your prior consent. Personal data will not be disclosed to third parties without your explicit consent.

Please note that data transmission over the Internet (e.g., email communication) can have security gaps. Complete protection of data from access by third parties is not possible. We are not liable for damages resulting from such security vulnerabilities.

Unsolicited Advertising

The use of contact details published on this website for sending unsolicited advertising or information materials is expressly prohibited. We reserve the right to take legal action in the event of unsolicited promotional information (e.g., spam emails).

Imprint​

VxLabs GmbH
Franz-Mayer-Str. 1
93053 Regensburg

Contact: [email protected]
Commercial register District Court Regensburg HRB 19099
USt-IdNr.: DE350861467
Managing Director: Mostafa Elkoumy

1) Introduction

At VxLabs (“we”, “us”, “our”), we are committed to protecting the privacy of our employees, suppliers, and customers. This Policy explains how we collect, use, store, share, and protect your personal data in line with the General Data Protection Regulation (GDPR) and applicable data protection laws.

2) Data Controller

VxLabs is the data controller for the personal data described in this Policy.
Contact: [email protected]

3) What is “personal data”?

Personal data” means any information relating to an identified or identifiable person—either directly (e.g., name) or indirectly (e.g., an ID number, online identifier, or one or more factors specific to identity).

4) What data we collect

Depending on your relationship with us, we may collect and process:

  • Identity Data (name, title, employee ID).

  • Contact Data (email, phone, postal address).

  • Financial Data (payment, invoicing details for suppliers/B2B customers).

  • Transaction Data (orders, services provided, payments).

  • Professional Data (for employees: employment history, qualifications, performance).

  • Technical Data (device information, IP address, logs, browsing events related to our services).

  • Marketing & Communication Data (preferences, subscriptions).

5) How we collect your data

  • Directly from you (recruitment and HR processes, supplier onboarding, customer engagements, forms, emails).

  • Automatically (through systems you access—e.g., logs, cookies, telemetry).

  • From third parties (e.g., background screening providers for employment, credit reference agencies for suppliers, public sources as permitted by law).

6) Why we use your data (purposes)

  • Employee Management (recruitment, payroll, benefits, performance, HR administration).

  • Supplier & Customer Management (account setup, contracts, orders, payments, relationship management).

  • Communication (service updates, notices, support).

  • Compliance (legal/regulatory obligations, record-keeping).

  • Business Operations (security, quality, analytics, service improvement).

  • Marketing (with your consent where required).

7) Legal bases for processing

  • Employee Management (recruitment, payroll, benefits, performance, HR administration).

  • Supplier & Customer Management (account setup, contracts, orders, payments, relationship management).

  • Communication (service updates, notices, support).

  • Compliance (legal/regulatory obligations, record-keeping).

  • Business Operations (security, quality, analytics, service improvement).

  • Marketing (with your consent where required).

8) Sharing your data

We may share personal data with:

  • Service providers / processors that support our operations (IT, HR/payroll, hosting, analytics, payment).

  • Professional advisers (legal, accounting) and authorities/regulators where required by law.

  • Transaction parties (e.g., in a merger, acquisition, or asset sale, subject to safeguards).

  • Others with your consent or as otherwise permitted by law.

9) International transfers

If personal data is transferred outside the EEA/UK, we implement appropriate safeguards (e.g., adequacy decisions, Standard Contractual Clauses plus supplementary measures where necessary).

10) Retention

We keep personal data only as long as necessary for the purposes above and to meet legal, accounting, or reporting requirements. Retention periods vary by data category and legal context. When data is no longer required, we securely delete or anonymise it.

11) Security

We apply technical and organisational measures to protect personal data (access controls, encryption where appropriate, least-privilege policies, vendor due diligence). No method of transmission or storage is completely secure; we work to mitigate risks and respond promptly to incidents.

12) Cookies & online activity

Our website uses cookies and similar technologies to improve functionality and user experience. Some cookies are essential; others (e.g., analytics/marketing) are optional and require consent.

  • You can control cookies via our cookie banner and your browser settings. Blocking some cookies may affect site functionality.

  • Website analytics: We use [insert analytics service, e.g., Matomo/Google Analytics 4] to understand traffic and improve services. Data is aggregated or pseudonymised where possible. See our Cookie Notice for details (types, purposes, retention).

13) Your rights (GDPR)

You may have the following rights, subject to conditions and local law:

  • Access to your personal data and a copy of it.

  • Rectification of inaccurate or incomplete data.

  • Erasure (“right to be forgotten”) where applicable.

  • Restriction of processing in certain cases.

  • Objection to processing based on legitimate interests and to direct marketing.

  • Data portability (where processing is based on consent or contract and carried out by automated means).
    To exercise your rights, contact [email protected]. We may need to verify your identity.

You also have the right to lodge a complaint with a supervisory authority—typically in your EU/EEA Member State of residence, place of work, or where an alleged infringement occurred.

14) Third-party links

Our websites may contain links to third-party sites. Those sites operate under their own privacy policies; we are not responsible for their practices. We encourage you to review their privacy notices.

15) Children’s data

Our services are not directed to children, and we do not knowingly process children’s personal data without appropriate legal basis and parental permissions where required.

16) Changes to this Policy

We may update this Policy from time to time. The “Last updated” date above reflects the latest version. Material changes will be highlighted where appropriate.

17) Contact

Questions, requests, or concerns:
Email: [email protected]

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Copyright ©2025 All Rights Reserved - VxLabs GmbH

Request Access to Files