The latest updates on cyber-physical attacks, threat actors and other industry news
What is Splice
Splice prevents death and destruction caused by cyber-physical attacks
Splice is deployed across a large metropolitan area in South Africa, enabling secure management of Smart City infrastructure for various disciplines, including Transportation, Surveillance and Facilities Management.
Splice provides deep visibility of expected and anomalous activity on these networks and shields vulnerable OT communications inside the encrypted Splice overlay network. Using Splice advanced visualisations, city management can identify and mitigate high risk areas, and eliminate avoidable risks to the networks. Splice also provides asset discovery and management, a key requirement to enable secure management of this OT network.
With Splice there is no need to touch the actual equipment or code.
Splice overcomes device and controller vulnerabilities by building vulnerability shielding, authentication, authorisation and access controls into the network layer.
Splice logically isolates targets in an encrypted overlay network for centralised profiling, segregation and Intrusion Detection.
Splice enables sensitive real world interfacing devices to co-exist securely inside existing IT networks.
How we do it
Splice evolves the Purdue model principles into a specialised ICS Secure Access Edge, protecting Operational Technology networks by providing:
- logical isolation in the network core
- vulnerability shielding inside an encrypted overlay network
- secure identity management
- secure remote access for operators, engineers and support partners
- passive node discovery and tracking
- behavioural profiling and advanced machine learning driven outlier and anomaly detection
Splice has been specifically designed to require no or minimal reconfiguration or interruption to existing production processes. Splice allows you to take back control over insecure and legacy components.
Test drive Splice with a zero-touch deployment using Cloudsplice-as-a-service. Cloudsplice provides full asset tracking, behavioral analysis and outlier detection using metadata forwarded from your network infrastructure via built-in capabilities. Get in touch via the chat link below for a free evaluation.
Splice-net builds a dedicated encrypted overlay network on top of existing carrier infrastructure, providing our customers with a secure private sensor network. Splice-net is carrier independent, allowing sensor networks to expand across multiple carrier footprints, and allowing for high availability by rerouting overlay traffic through alternate carriers. Customers remain in full control of encryption keys and therefore fully in charge of their sensor networks, even where traffic traverse hostile or untrustworthy carriers.
IT security practices do not always translate well for OT security or IoT security purposes. For various reasons, it may not be viable to patch vulnerabilities in HMI’s, PLC’s or other Operational Technology systems.
Splice provides a way to mitigate these vulnerabilities through Vulnerability Shielding by injecting authentication code into the existing communication flow. When a sensitive function is accessed, Splice takes over from the normal application flow and requests OTP or password verification before forwarding the request through to the HMI. Using Vulnerability Shielding, Role Based Access Control (with or without two factor authentication) can be built into legacy applications without touching the application code.