TURNING TARGETS INTO TIGERS
ABOUT CYBERSPLICE
Cybersplice (Pty) Ltd (Reg no: 2018/458570/07) is a privately held South African Company based in Cape Town. We have implementation partners with offices in 22 countries across 6 continents.
We service and provide support for customers through our partner network. By leveraging the visibility from Splice we assist customers with:
- Identifying vulnerabilities and exposures in Operational Networks
- Developing standards and processes focused on Operational Technology
- Designing Cyber-physical Resilient Architectures
- Discovering assets and unintentional network bridges
ABOUT SPLICE
For many years the prevailing wisdom to OT security was isolation through air-gap. Apart from high-security environments, this approach has both practical and rational limitations, especially where OT devices are located over a large geographical area.
Supporting air-gapped networks requires additional human resources, infrastructure, security and monitoring. By implementing air gaps, synergies of using converged data, communications and control network are lost.
In the absence of an air-gapped network, companies usually turn to either connecting OT devices straight to the data (IT) network or using VLANs to segregate these devices from the data network.
However, VLANs are generally considered inadequate when used as a security mechanism. VLANs were designed as a network management feature and isolation is not usually propagated across the WAN. This means that unless the device is further secured, the device is still open to attacks across the wider network.
VLANs however do have a part to play in securing OT networks. When configured as a Private VLAN with port isolation and combined with a Splice Cloaking Device, this can effectively isolate the OT network to provide the logical equivalent of an air gap.
Where the Cloaking devices in combination with the supernodes and controller establish an OT Overlay Network, enhancements such as traffic filtering, virtual patching, IPS, authentication offloading and even role-based access can be achieved.
These features are combined with robust behavioural profiling in one package: Cybersplice.
- Asset management
- Identity and access management (IAM)
- Security management
- Anomaly detection and response
- Network-based security
- Near endpoint-based security
- Supported through specialist OT security consulting, integration and managed services
SPLICE'S RADICAL DESIGN
Splice’s radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:
- Micro-segmentation
- API strengthening
- Virtual network-level patching
- Cloud capability
- Vulnerability shielding
- Secure remote access
- Black box flight recorder