Cyber Security

A Four-Pronged Approach:

1- Prevent malware entering your site with USB protection

2- Detect vulnerabilities and incidents with software built for the Industrial Automation use-case

3- Secure unencrypted cable runs from “Man in the Middle" threats

4- Detect unauthorised changes to controllers and SCADA systems and recover them to a known good.  A customer reminded us recently that  ”you don’t get fired for having a cyber-attack on your site but you do get fired if you cannot recover from one”


USB Sheepdip

Prevents malware infections

 Eliminates human-factors in your digital security risk factors

Prevents the unauthorised use of USB-based devices

Allows for zone-based authorisation of USB

View products

Deep Packet Inspection

Real time incident reporting

Learns nature of industrial network for anomaly detection

Discover zero-day vulnerabilities

No interruption to operations

View products

Change Management

Secure backup disaster recovery

recognise unauthorised changes

personnel time/date based change log audit trail

Full deployable history of previous versions

View products

E2EE Encryption

No loss of bandwidth

Secure legacy PLCs and automation equipment

Low latency

Prevent man-in-the-middle attacks

View Products

REMARQUE ! Ce site utilise des cookies et autres technologies similaires.

Si vous ne changez pas les paramètres de votre navigateur, vous êtes d'accord.

J'ai compris


Please login using your credentials recived by email when you register.

  or   Créer un compte

Mot de passe oublié ? |  Identifiant oublié ?


Register now

This is a Quick registration Module. Please register to get access to downloads and product specific documents.

  or   Login