Cyber Security

We live in a connected world, one where physical boundaries no longer protect us. All of the world's top organisations, banks to power plants, rely upon a strong cyber security policy. That being said, network and device protection is still not being taken seriously in 2017. Cyber-attacks are an international concern; high-profile breaches have proven national and global economies are at risk. Even more worrisome, attacks on critical national infrastructure put lives at risk.

At MAC we are dedicated to understanding what's important to our customer, to best help them secure their equipment and software systems from cyber-attacks. Our Cyber initiative is focused on protecting your operational networks, controllers and software systems from not only the known attack vector, but the zero day too.

History goes to show that defence is important, but being able to be agile and reactive within your own network reduces the impact if the worst does occur. With that in mind, we ensure that all of our customers have resilient disaster recovery plans in place, with mature tools and practices that hold up to all industrial and network protocols and systems.

XSense

Real-time Incident Reporting

Learns deterministic nature of industrial networks

Discovery of zero-day vulnerabilities

No interruption to operations

Read more

USB Device Security/Sheepdip

Prevents both intentional and unintentional malware infections

Eliminates the human factor in your security equation

Prevents the use of unauthorised USB based devices

Zone based authorisation for USB devices

Read more

PLC/SCADA Change Management

Secure backup disaster recovery

Recognises unauthorised changes

Personnel time/date stamp based change log audit trail

Full deployable history of previous versions

Read more

OPC UA

SECURE: encryption, authentication, and auditing

Platform independence: from an embedded micro-controller to cloud-based infrastructure

Extensible: ability to add new features without affecting existing applications

Comprehensive information modeling: for defining complex information

Read more

  • Filters
  • Switch to grid layout
  • Swtich to table layout
x-sense

Continuous Risk Monitoring for IIOT & ICS/SCADA Networks

Thinking of buying online?

Why not look at our webstore

If you have an urgent requirement please look at our webstore to see the products available for online purchases.

NOTE! This site uses cookies and similar technologies.

If you do not change browser settings, you agree to it.

I understand

Login

Please login using your credentials recived by email when you register.

  or   Create an account

Forgot your password? |  Forgot your username?

×

Register now


This is a Quick registration Module. Please register to get access to downloads and product specific documents.



  or   Login
×