Cyber Security

A Four-Pronged Approach:

1- Prevent malware entering your site with USB protection

2- Detect vulnerabilities and incidents with software built for the Industrial Automation use-case

3- Secure unencrypted cable runs from “Man in the Middle" threats

4- Detect unauthorised changes to controllers and SCADA systems and recover them to a known good.  A customer reminded us recently that  ”you don’t get fired for having a cyber-attack on your site but you do get fired if you cannot recover from one”

 

USB Sheepdip

Prevents malware infections

Eliminiates human-factors in your digital security risk factors

Prevents the unauthorised use of USB-based devices

Allows for zone-based authorisation of USB

View products

Deep Packet Inspection

Real time incident reporting

Learns nature of industiral network for anomaly detection

Discover zero-day vulnerabilities

No interruption to operations

View products

Change Management

Secure backup disater recovery

recognise unauthorised changes

personnel time/date based change log audit trail

Full deployable istory of previous versions

View products

E2EE Encryption

Secure legacy PLCs and automation equipment

Prevent man-in-the-middle attackes

TCP/IP traffic cannot be sniffed and decoded

Built for extreme conditions and wide temprature ranges

View products

Thinking of buying online?

Why not look at our webstore

If you have an urgent requirement please look at our webstore to see the products available for online purchases.

NOTE! This site uses cookies and similar technologies.

If you do not change browser settings, you agree to it.

I understand

Login

Please login using your credentials recived by email when you register.

  or   Create an account

Forgot your password? |  Forgot your username?

×

Register now


This is a Quick registration Module. Please register to get access to downloads and product specific documents.



  or   Login
×