The latest updates on cyber-physical attacks, threat actors and other industry news
INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS
With Splice there is no need to touch the actual equipment or code.
Splice overcomes device and controller vulnerabilities by building vulnerability shielding, authentication, authorisation and access controls into the network layer.
PLC / DCS
Splice logically isolates targets in an encrypted overlay network for centralised profiling, segregation and Intrusion Detection.
BIOMEDICAL, I-IOT AND EMBEDDED
Splice enables sensitive real world interfacing devices to co-exist securely inside existing IT networks.
What is Splice
PREVENTING destructiVE cyber-physical attacks
SPLICE-NET / SPLICE EDGE SHIELD AND PROTECT
SPLICE-NET / SPLICE IN-PATH
virtual, light and deep probes
Secure remote access Full Vulnerability Shielding
In-core and edge isolation
Insecure protocol wrapping
How we do it
Splice initially operates in an out-of-band mirror mode, and transitions to edge and in-path modes at your own pace. Splice has been specifically designed to require no or minimal reconfiguration or interruption to existing production processes, allowing you to take back control over insecure and legacy components.
Switch the lights on in your OT network using Splicecloud with zero-touch, virtual, light or deep probes. Splicecloud provides full asset tracking, behavioural analysis and outlier detection using metadata forwarded from your network infrastructure via built-in capabilities. Use the deep probe option for high-definition visibility and automatic node identification.
Extend OT Network reach across hostile carriers.
Splice-net builds a dedicated encrypted overlay network on top of existing carrier infrastructure, for a secure private sensor network. Splice-net is carrier independent, allowing sensor networks to expand across multiple carrier footprints, and enables high availability by rerouting overlay traffic through alternate carriers. Customers remain in full control of encryption keys and therefore fully in charge of their sensor networks, even where traffic traverses hostile or untrustworthy carriers.
IT security practices do not always translate well for OT security or IoT security purposes. For various reasons, it may not be viable to patch vulnerabilities in HMI’s, PLC’s or other Operational Technology systems.
Splice shields vulnerable OT equipment inside an encrypted overlay network, disrupting the kill chain for would-be attackers.
Splice further provides a way to mitigate these vulnerabilities by shielding sensitive system functions. This is done by injecting an authentication code into the existing communication flow. When a sensitive function is accessed, Splice takes over from the normal application flow and requests OTP or password verification before forwarding the request through to the HMI. Using this capability, Role-Based Access Control (with or without two-factor authentication) can be built into legacy applications without touching the application code.
Splice in action
Splice is deployed across a large metropolitan area in South Africa, enabling secure management of Smart City infrastructure for various disciplines, including Transportation, Surveillance and Facilities Management.
Splice provides deep visibility of expected and anomalous activity on these highly converged networks. Splice advanced visualisations identify and enables mitigation of high exposure areas, eliminating avoidable risks in these networks. In addition, Splice provides asset discovery and management, remote access capabilities, in-core isolation and identity shielding – key requirements to enable secure management of these OT networks.
We protect customers across diverse industries, including food processing, beverage and packaging manufacturers, building automation, transport, and mining, as well as heavy industries such as metal forming, oil and gas.