logologologologo
  • Splice
  • OT Security
  • Products
    • Industry solutions
    • Demos
    • Cloudsplice
  • Services
    • Professional Services
    • Assessment and Discovery Services
  • News
  • Community
    • Forum
    • Portal
    • Academy
  • Contact
    • Contact
    • Company info
    • Terms of use
    • Privacy Policy

Login

logologologologo
  • Splice
  • OT Security
  • Products
    • Industry solutions
    • Demos
    • Cloudsplice
  • Services
    • Professional Services
    • Assessment and Discovery Services
  • News
  • Community
    • Forum
    • Portal
    • Academy
  • Contact
    • Contact
    • Company info
    • Terms of use
    • Privacy Policy

Login

logologologologo
  • Splice
  • OT Security
  • Products
    • Industry solutions
    • Demos
    • Cloudsplice
  • Services
    • Professional Services
    • Assessment and Discovery Services
  • News
  • Community
    • Forum
    • Portal
    • Academy
  • Contact
    • Contact
    • Company info
    • Terms of use
    • Privacy Policy

Login

logologologologo
  • Splice
  • OT Security
  • Products
    • Industry solutions
    • Demos
    • Cloudsplice
  • Services
    • Professional Services
    • Assessment and Discovery Services
  • News
  • Community
    • Forum
    • Portal
    • Academy
  • Contact
    • Contact
    • Company info
    • Terms of use
    • Privacy Policy

Login

  • Splice
  • OT Security
  • Products
    • Industry solutions
    • Demos
    • Cloudsplice
  • Services
    • Professional Services
    • Assessment and Discovery Services
  • News
  • Community
    • Forum
    • Portal
    • Academy
  • Contact
    • Contact
    • Company info
    • Terms of use
    • Privacy Policy

Splice actively prevents cyber-physical attacks through vulnerability shielding inside an encrypted overlay network. Embrace connection and convergence. Cybersplice your OT security and IoT security: the logical alternative to air-gaps, firewalls, data diodes and old school thinking.

CYBER-PHYSICAL RESILIENCE RAPID VISIBILITY FOR YOUR OPERATIONAL TECHNOLOGY NETWORK PROTECTING SMART CITIES TURNING TARGETS INTO TIGERS - SECURE ACCESS EDGE FOR CONVERGED IT/OT NETWORKS PREVENTING CYBER ATTACK RAPID VISIBILITY FOR YOUR CRITICAL INFRASTRUCTURE NETWORK PROTECTING HUMAN LIFE TURNING TARGETS INTO TIGERS - SECURE ACCESS EDGE FOR BIOMEDICAL DEVICES

What is Splice

Splice prevents death and destruction caused by cyber-physical attacks

We can help

Rapid visibility.

Am I exposed?

We’re under attack!

I want to be in control.

Splice in action

Splice is deployed across a large metropolitan area in South Africa, enabling secure management of Smart City infrastructure for various disciplines, including Transportation, Surveillance and Facilities Management.

Splice provides deep visibility of expected and anomalous activity on these highly converged networks.   Splice advanced visualisations identifies and enables mitigation of high exposure areas, eliminating avoidable risks in these networks. In addition, Splice provides asset discovery and management, remote access capabilities, in-core isolation  and identity shielding – key requirements to enable secure management of these OT networks.

Our customers include large food processing, beverage and packaging manufacturers,  property portfolio managers (supporting fire and safety, security, surveillance and building management), and heavy industries such as metal forming, oil and gas.

Applications

scada
SCADA

With Splice there is no need to touch the actual equipment or code.

ics
IACS

Splice overcomes device and controller vulnerabilities by building vulnerability shielding, authentication, authorisation and access controls into the network layer.

emb
PLC/DCS

Splice logically isolates targets in an encrypted overlay network for centralised profiling, segregation and Intrusion Detection.

iot
BIOMEDICAL

Splice enables sensitive real world interfacing devices to co-exist securely inside existing IT networks.

How we do it

  • Splice protection

Splice evolves the Purdue model principles into a specialised ICS Secure Access Edge, protecting Operational Technology networks by providing:

  • logical isolation in the network core
  • vulnerability shielding inside an encrypted overlay network
  • secure identity management
  • secure remote access for operators, engineers and support partners
  • passive node discovery and tracking
  • behavioural profiling and advanced machine learning driven outlier and anomaly detection

Splice has been specifically designed to require no or minimal reconfiguration or interruption to existing production processes. Splice allows you to take back control over insecure and legacy components.

  • Test drive Splice

Test drive Splice with a zero-touch deployment using Cloudsplice-as-a-service. Cloudsplice provides full asset tracking, behavioral analysis and outlier detection using metadata forwarded from your network infrastructure via built-in capabilities. Get in touch via the chat link below for a free evaluation.

  • Extended reach across hostile carriers

Splice-net builds a dedicated encrypted overlay network on top of existing carrier infrastructure, providing our customers with a secure private sensor network. Splice-net is carrier independent, allowing sensor networks to expand across multiple carrier footprints, and allowing for high availability by rerouting overlay traffic through alternate carriers. Customers remain in full control of encryption keys and therefore fully in charge of their sensor networks, even where traffic traverse hostile or untrustworthy carriers.

Vulnerability Shielding

IT security practices do not always translate well for OT security or IoT security purposes. For various reasons, it may not be viable to patch vulnerabilities in HMI’s, PLC’s or other Operational Technology systems.

Splice provides a way to mitigate these vulnerabilities through Vulnerability Shielding by injecting authentication code into the existing communication flow. When a sensitive function is accessed, Splice takes over from the normal application flow and requests OTP or password verification before forwarding the request through to the HMI. Using Vulnerability Shielding, Role Based Access Control (with or without two factor authentication) can be built into legacy applications without touching the application code.

100%
Embedded
100%
IoT
100%
ICS
Latest News

The latest updates on cyber-physical attacks, threat actors and other industry news

view all posts

CISA Notifies Hitachi Energy Customers of High-Severity Vulnerabilities

11 Jan 2023
CISA Notifies Hitachi Energy Customers of High-Severity Vulnerabilities...
General info
cybersplice

Medical Device Cybersecurity Operational Technology (OT) Requirements US 2023 Bill

10 Jan 2023
According to Dr. Suzanne Schwartz of the U.S. Food and Drug Administration,...
General info
cybersplice

ABB Flow control vulnerabilities

14 Nov 2022
ABB Totalflow path traversal vulnerability in ABB G5 products provides root access, impacting safety as well as billing.  ABB recommends network...
General info
cybersplice

CISA releases Cybersecurity Performance Goals

31 Oct 2022
The US Department of Homeland Security (DHS) Cybersecurity and...
General info
cybersplice

More healthcare IOT woes: Infusion Pumps

10 Sep 2022
Multiple vulnerabilities exist in Baxter  SIGMA Spectrum Infusion Pumps...
General info
cybersplice

Social

  • LinkedIn

Quick Links

  • Self Assessment
  • Terms of use
  • Privacy Policy
  • Contact

Contacts

[email protected]

+27 87 700 3178

1 Ruchill Road, Diep River, Cape Town, South Africa

2022 © Copyright Cybersplice. All Rights Reserved.

Login

Lost Your Password?