The automotive industry is in the middle of a digital transformation, underpinned by connectivity and applications. Risk, privacy and vehicle safety are all colliding as consumers demand connectivity, applications and smartphone integration.

Mi3 RECON delivers peace-of-mind for vehicle system applications, app
marketplaces and infotainment offerings, ensuring app risk is understood.



Scan applications before delivering to vehicle to be sure the app has no known vulnerabilities and the risk posture does not exceed customizable threshold. MI3 RECON can notify you if vulnerabilities are later found in code that exists in vehicles, allowing you to proactively update, minimizing the time the vulnerability exists in the field.

When surveyed, 54% of new car buyers are afraid
people can hack into and manipulate their vehicle!
— http://www.mckinsey.com/industries/automotive-and-assembly/our-insights/whats-driving-the-connected-car


Rise of app stores and reduce smartphone dependency for in-car capabilities.  Offer safe apps in your vendor marketplace by scanning with Mi3 RECON.  If risk posture changes, the continuous analysis performed by Mi3 RECON will alert you to new vulnerabilities, allowing you to work with the application vendors and minimize risk to your customers. 

Using Mi3 RECON you can embed application risk scanning as part of your release process to make applications available in the store.  Ensure that applications made available for download to in-vehicle infotainment systems do not compromise the security and privacy of your customers.


Mi3 RECON not only scans the application, but also the endpoints the application communicates with.  This allows you to be sure that a connected car is not communicating with known malicious or insecure endpoints. 

Using the Mi3 RECON Platform with AppInterrogator API access you can instrument your software delivery pipeline to deliver safe and secure applications for connected vehicles.  The robust risk intelligence gathered provides piece of mind that applications delivered are safe and secure, but also the endpoints those applications connect to are not malicious.  Ensuring your customers safety and privacy.