{"id":26521,"date":"2025-07-02T06:31:45","date_gmt":"2025-07-02T06:31:45","guid":{"rendered":"https:\/\/www.sonatus.com\/?p=26521"},"modified":"2025-07-02T18:11:19","modified_gmt":"2025-07-02T18:11:19","slug":"enhancing-sonatus-foundation-for-network-security","status":"publish","type":"post","link":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/","title":{"rendered":"Enhancing Sonatus Foundation for Network Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has been deployed in millions of vehicles, and it is delivering tangible benefits to our customers in production every day. Today, we are announcing a realignment of one element of our platform around cybersecurity.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As vehicles become increasingly connected and software-defined, cybersecurity has become an essential element to ensure SDVs remain safe and secure while they deliver enhanced capabilities, including over-the-air upgrades. In fact, in the recent <a href=\"https:\/\/www.sonatus.com\/resources\/software-defined-vehicle-survey-2025-ebook\/\">SDV survey<\/a> sponsored by Sonatus and conducted by Wards Intelligence, cybersecurity was the top concern raised by 34% of respondents as a potential impediment to SDV adoption.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sonatus actively contributes to the safety and security of SDVs by providing crucial in-vehicle and vehicle-to-cloud safeguards. With the advent of high-speed Ethernet networks in vehicles, our robust Ethernet Intrusion Detection Service (EIDS) capabilities offer protection against unwanted and potentially malicious incidents on the in-vehicle networks. Cloud connectivity is secured with our Firewall service, which ensures that only authorized cloud-to-vehicle traffic is permitted, securing this vital interface that are often a cyber threat attack surface.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Both capabilities are designed to integrate seamlessly with a cloud-based Vehicle Security Operations Center (VSOC). Previously part of our Sonatus Guard solution, they are now incorporated into the Sonatus Foundation suite of network services. As a result, Foundation\u2019s EIDS and Firewall features can be deployed alongside an OEM\u2019s existing or third-party VSOC, minimizing disruption to their overall cybersecurity operations. This flexible approach enables OEMs to strengthen their overall cybersecurity strategy by combining robust in-vehicle and vehicle-to-cloud communications protections with their choice of threat intelligence and mitigation solutions. With this re-alignment of these important capabilities into Sonatus Foundation, Sonatus Guard will be discontinued.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about the newly enhanced <a href=\"https:\/\/www.sonatus.com\/products\/foundation\/\">Sonatus Foundation<\/a>, check out our website or reach out to us. We\u2019ll be glad to give you a more detailed briefing on how Sonatus can contribute to ensuring the security of SDVs.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has&hellip;<\/p>\n","protected":false},"author":10,"featured_media":26546,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[58],"tags":[],"post_series":[],"class_list":["post-26521","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enhancing Sonatus Foundation for Network Security | Sonatus<\/title>\n<meta name=\"description\" content=\"Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has been deployed in millions of vehicles, and it is delivering tangible benefits to our customers in production every day. Today, we are announcing a realignment of one element of our platform around cybersecurity.\u00a0\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing Sonatus Foundation for Network Security\" \/>\n<meta property=\"og:description\" content=\"Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has been deployed in millions of vehicles, and it is delivering tangible benefits to our customers in production every day. Today, we are announcing a realignment of one element of our platform around cybersecurity.\u00a0\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sonatus\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-02T06:31:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-02T18:11:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dr. John Heinlein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Heinlein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/\"},\"author\":{\"name\":\"John Heinlein\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/person\/dfe21c76bb5b2a1f2242e79298e349ea\"},\"headline\":\"Enhancing Sonatus Foundation for Network Security\",\"datePublished\":\"2025-07-02T06:31:45+00:00\",\"dateModified\":\"2025-07-02T18:11:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/\"},\"wordCount\":337,\"publisher\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png\",\"articleSection\":[\"Company\"],\"inLanguage\":\"zh-CN\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/\",\"url\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/\",\"name\":\"Enhancing Sonatus Foundation for Network Security | Sonatus\",\"isPartOf\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png\",\"datePublished\":\"2025-07-02T06:31:45+00:00\",\"dateModified\":\"2025-07-02T18:11:19+00:00\",\"description\":\"Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has been deployed in millions of vehicles, and it is delivering tangible benefits to our customers in production every day. Today, we are announcing a realignment of one element of our platform around cybersecurity.\u00a0\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#breadcrumb\"},\"inLanguage\":\"zh-CN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#primaryimage\",\"url\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png\",\"contentUrl\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sonatus.com\/zh-cn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing Sonatus Foundation for Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#website\",\"url\":\"https:\/\/www.sonatus.com\/zh-cn\/\",\"name\":\"Sonatus\",\"description\":\"Accelerating Vehicle Software Innovation\",\"publisher\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sonatus.com\/zh-cn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-CN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#organization\",\"name\":\"Sonatus\",\"url\":\"https:\/\/www.sonatus.com\/zh-cn\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg\",\"contentUrl\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg\",\"width\":202,\"height\":32,\"caption\":\"Sonatus\"},\"image\":{\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/sonatus\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/person\/dfe21c76bb5b2a1f2242e79298e349ea\",\"name\":\"John Heinlein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/person\/image\/04a3df65ea279be2e8e93802792d7884\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f7b1508effc73f447462f527486e867bdb696e2f68c5717f9f608d4b894d0996?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f7b1508effc73f447462f527486e867bdb696e2f68c5717f9f608d4b894d0996?s=96&d=mm&r=g\",\"caption\":\"John Heinlein\"},\"url\":\"https:\/\/www.sonatus.com\/zh-cn\/blog\/author\/john-heinleinsonatus-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Enhancing Sonatus Foundation for Network Security | Sonatus","description":"Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has been deployed in millions of vehicles, and it is delivering tangible benefits to our customers in production every day. Today, we are announcing a realignment of one element of our platform around cybersecurity.\u00a0\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/","og_locale":"zh_CN","og_type":"article","og_title":"Enhancing Sonatus Foundation for Network Security","og_description":"Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has been deployed in millions of vehicles, and it is delivering tangible benefits to our customers in production every day. Today, we are announcing a realignment of one element of our platform around cybersecurity.\u00a0\u00a0","og_url":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/","og_site_name":"Sonatus","article_published_time":"2025-07-02T06:31:45+00:00","article_modified_time":"2025-07-02T18:11:19+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png","type":"image\/png"}],"author":"Dr. John Heinlein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"John Heinlein","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#article","isPartOf":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/"},"author":{"name":"John Heinlein","@id":"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/person\/dfe21c76bb5b2a1f2242e79298e349ea"},"headline":"Enhancing Sonatus Foundation for Network Security","datePublished":"2025-07-02T06:31:45+00:00","dateModified":"2025-07-02T18:11:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/"},"wordCount":337,"publisher":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/#organization"},"image":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png","articleSection":["Company"],"inLanguage":"zh-CN"},{"@type":"WebPage","@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/","url":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/","name":"Enhancing Sonatus Foundation for Network Security | Sonatus","isPartOf":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png","datePublished":"2025-07-02T06:31:45+00:00","dateModified":"2025-07-02T18:11:19+00:00","description":"Sonatus has a long history of deploying critical infrastructural technologies that every software-defined vehicle needs. Our Sonatus Vehicle Platform has been deployed in millions of vehicles, and it is delivering tangible benefits to our customers in production every day. Today, we are announcing a realignment of one element of our platform around cybersecurity.\u00a0\u00a0","breadcrumb":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#breadcrumb"},"inLanguage":"zh-CN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#primaryimage","url":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png","contentUrl":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2025\/06\/Foundation-Blog-Feature-Image.png","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.sonatus.com\/zh-cn\/blog\/enhancing-sonatus-foundation-for-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sonatus.com\/zh-cn\/"},{"@type":"ListItem","position":2,"name":"Enhancing Sonatus Foundation for Network Security"}]},{"@type":"WebSite","@id":"https:\/\/www.sonatus.com\/zh-cn\/#website","url":"https:\/\/www.sonatus.com\/zh-cn\/","name":"Sonatus","description":"Accelerating Vehicle Software Innovation","publisher":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sonatus.com\/zh-cn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-CN"},{"@type":"Organization","@id":"https:\/\/www.sonatus.com\/zh-cn\/#organization","name":"Sonatus","url":"https:\/\/www.sonatus.com\/zh-cn\/","logo":{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/logo\/image\/","url":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg","contentUrl":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg","width":202,"height":32,"caption":"Sonatus"},"image":{"@id":"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/sonatus\/"]},{"@type":"Person","@id":"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/person\/dfe21c76bb5b2a1f2242e79298e349ea","name":"John Heinlein","image":{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.sonatus.com\/zh-cn\/#\/schema\/person\/image\/04a3df65ea279be2e8e93802792d7884","url":"https:\/\/secure.gravatar.com\/avatar\/f7b1508effc73f447462f527486e867bdb696e2f68c5717f9f608d4b894d0996?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7b1508effc73f447462f527486e867bdb696e2f68c5717f9f608d4b894d0996?s=96&d=mm&r=g","caption":"John Heinlein"},"url":"https:\/\/www.sonatus.com\/zh-cn\/blog\/author\/john-heinleinsonatus-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/posts\/26521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/comments?post=26521"}],"version-history":[{"count":5,"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/posts\/26521\/revisions"}],"predecessor-version":[{"id":26846,"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/posts\/26521\/revisions\/26846"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/media\/26546"}],"wp:attachment":[{"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/media?parent=26521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/categories?post=26521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/tags?post=26521"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/www.sonatus.com\/zh-cn\/wp-json\/wp\/v2\/post_series?post=26521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}