REDUCE CYBER-PHYSICAL EXPOSURE
ACTIVE PROTECTION FOR OT NETWORKS
Splice evolves the Purdue model principles into a specialised ICS Secure Access Edge, protecting Operational Technology networks by mediating Trust into protected zones (comparable to Zero Trust Network Access (ZTNA) in IT). Splice provides:
- Secure identity management
- Passive node discovery and tracking
- Behavioural profiling and advanced machine learning-driven outlier and anomaly detection
- Logical isolation in the network core
- Vulnerability shielding inside an encrypted overlay network
- Secure remote access for operators, engineers and support partners
Splice initially operates in an out-of-band mirror mode and transitions to edge and in-path modes at your own pace. Splice has been specifically designed to require no or minimal reconfiguration or interruption to existing production processes, allowing you to take back control over insecure and legacy components.
Take back control
+27 87 700 3178
Turning Targets into Tigers
Today’s OT networks need to strike a balance between the convenience of convergence and the ability to maintain observability, operability and controllability (i.e. OT security). There are many points in OT security architecture design where these attributes are likely to be targeted.
Security weaknesses found in the control network and field devices are likely to be around for some time yet. Splice secures the OT network with a new approach to logical isolation, control enhancement and behavioural monitoring. This means that investments already made in vulnerable legacy devices and systems will not expose the entire operation.