ACTIVE PROTECTION FOR ENHANCED OT NETWORK SECURITY
Splice-active evolves the Purdue model principles into a specialised ICS Secure Access Edge, protecting Operational Technology networks by mediating Trust into protected zones (comparable to Zero Trust Network Access (ZTNA) in IT). Splice-active provides:
- Secure identity management for network accessible OT equipment
- Passive node discovery and tracking
- Behavioural profiling and advanced machine learning-driven outlier and anomaly detection
- Logical isolation in the network core
- Vulnerability shielding for legacy equipment inside an encrypted overlay network
- Secure remote access for operators, engineers and support partners
Splice-active initially operates in an out-of-band mirror mode and transitions to edge and in-path modes at your own pace. Splice-active has been specifically designed to require no or minimal reconfiguration or interruption to existing production processes, allowing you to take back control over insecure and legacy components.
Turning Targets into Tigers
Today’s OT networks need to strike a balance between the convenience of convergence and the ability to maintain observability, operability and controllability (i.e. OT security). There are many points in OT security architecture design where these attributes are likely to be targeted.
Security weaknesses found in the control network and field devices are likely to be around for some time yet. Splice-active secures the OT network with a new approach to logical isolation, control enhancement and behavioural monitoring. This means that investments already made in vulnerable legacy devices and systems will not expose the entire operation.