SECURING OT NETWORKS

CYBER-PHYSICAL RESILIENCE

PREVENT DESTRUCTIVE CYBER-PHYSICAL ATTACKS

SPLICECLOUD RAPID VISIBILITY

Switch the lights on in your OT network using Splicecloud with zero-touch, virtual, light or deep probes.  Splicecloud provides full asset tracking, behavioural analysis and outlier detection using metadata forwarded from your network infrastructure via built-in capabilities. Use the deep probe option for high-definition visibility and automatic node identification.

SPLICE-NET INDUSTRIAL CONNECTIVITY

Extend OT Network reach across hostile carriers. Splice-net builds a dedicated encrypted overlay network on top of existing carrier infrastructure, for a secure private sensor network. Splice-net is carrier independent, allowing sensor networks to expand across multiple carrier footprints, and enables high availability by rerouting overlay traffic through alternate carriers.
Customers remain in full control of encryption keys and therefore fully in charge of their sensor networks, even where traffic traverses hostile or untrustworthy carriers.

SPLICE IN-PATH AND EDGE PROTECTION

Splice evolves the Purdue model principles into a specialised ICS Secure Access Edge, protecting Operational Technology networks by providing:
Splice initially operates in an out-of-band mirror mode, and transitions to edge and in-path modes at your own pace. Splice has been specifically designed to require no or minimal reconfiguration or interruption to existing production processes, allowing you to take back control over insecure and legacy components.

VULNERABILITY SHIELDING

IT security practices do not always translate well for OT security or IoT security purposes. For various reasons, it may not be viable to patch vulnerabilities in HMI’s, PLC’s or other Operational Technology systems.

Splice shields vulnerable OT equipment inside an encrypted overlay network, disrupting the kill chain for would-be attackers.

Splice further provides a way to mitigate these vulnerabilities by shielding sensitive system functions. This is done by injecting an authentication code into the existing communication flow. When a sensitive function is accessed, Splice takes over from the normal application flow and requests OTP or password verification before forwarding the request through to the HMI. Using this capability, Role-Based Access Control (with or without two-factor authentication) can be built into legacy applications without touching the application code.

SPLICE IN ACTION

Splice is deployed across a large metropolitan area in South Africa, enabling secure management of Smart City infrastructure for various disciplines, including Transportation, Surveillance and Facilities Management.

Splice provides deep visibility of expected and anomalous activity on these highly converged networks.   Splice advanced visualisations identify and enables mitigation of high exposure areas, eliminating avoidable risks in these networks. In addition, Splice provides asset discovery and management, remote access capabilities, in-core isolation and identity shielding – key requirements to enable secure management of these OT networks.

We protect customers across diverse industries, including food processing, beverage and packaging manufacturers,  building automation, transport, and mining, as well as heavy industries such as metal forming, oil and gas.

CYBER-PHYSICAL SECURITY REQUIREMENTS

UNIQUE INDUSTRY CONSIDERATIONS

Download the Splice brochure for your industry

LATEST NEWS

KEEP INFORMED

The latest updates on OT vulnerabilities, cyber-physical attacks, threat actors and other industry news