Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • Micro-segmentation
  • Vulnerability shielding
  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability


Cloudsplice has been designed for the following use cases:

  • simplified deployments for those who do not wish to host the overlay network in their own environment
  • try-before-you-buy (proof of value - POV) option to evaluate the suitability of Splice for your environment
  • offloading of compute intensive machine learning algorithms to the Cloud

Several options are available to suit your environment and risk appetite, allowing you to transition from mirror mode to in-path at your own pace.

The table below compares Splice on premise to Cloudsplice.  










Splice modes        
Mirror mode x x x x
In-path mode x x x  
Redundant overlay network x x x  
Hardware / Virtual H V H or V V
Splice features        
Asset discovery x x x x
Behavioral profiling x x x x
Intrusion Inspection x x x x
Logical group segregation x x x  
Flight recorder x x x x
Vulnerability shielding x x x  
Multi factor authentication offloading x x x  
Security enhanced microservices x x x  
Remote support x   x  
Basic OT network health monitoring x x x  
Enhanced OT network health monitoring x   x  
Security monitoring 1 2 2  


1 - connect to own TOC/SOC

2 - Cybersplice monitoring


Try Splice with zero risk and no commitment in mirror mode, connecting to Cloudsplice servers.

Click here to get started with a Proof of Value (POV).