Ticking the feature boxes
- Asset management
- Anomaly detection and response
- Security management
- Network-based security
- Identity and access management (IAM)
- Near endpoint-based security
- Supported through specialist OT security consulting, integration and managed services
Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:
- Vulnerability shielding
- API strenghtening
- Secure remote access
- Virtual network level patching
- Black box flight recorder
- Cloud capability
Cybersplice is the trading name for World Focus 560 CC (Reg no: 2004/083054/23), a South African Close Corporation established in 2004.
Besides the flagship SPLICE system, Cybersplice has also designed security architectures for custom authentication offloading and Web Application Firewalls. In addition, Cybersplice provides Information Security consulting services, which include:
- Security Architecture Design and Assessment
- Vulnerability Assessment and Vulnerability Management
- Incident Response
- Information Risk Management
- Infrastructure Auditing
- Systems Testing
- Security Systems Configuration and Management
- Standards Development and Implementation
For many years the prevailing wisdom to OT security was isolation through air-gap. Apart from high security environments, this approach has both practical and rational limitations, especially where OT devices are located over a large geographical area.
Supporting air-gapped networks requires additional human resources, infrastructure, security and monitoring. By implementing air-gaps, synergies of using a converged data, communications and control network is lost.
In the absence of an air-gapped network, companies usually turn to either connecting OT devices straight to the data (IT) network or using VLANs to segregate these devices from the data network.
VLANs however are generally considered inadequate when used as a security mechanism on its own. VLANs were designed as a network management feature and isolation is not usually propagated across the WAN. This means that unless the device is further secured, the device is still open to attacks across the wider network.
VLANs however do have a part to play in securing OT networks. When configured as a Private VLAN with port isolation and combined with a Splice Cloaking Device, this can effectively isolate the OT network to provide the logical equivalent of an air-gap.
Where the Cloaking devices in combination with the controller establish an OT Overlay Network, enhancements such as traffic filtering, virtual patching, IPS, authentication offloading and even role-based access can be achieved.
These features are combined with powerful behavioral profiling in one package: Cybersplice.