Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • Micro-segmentation
  • Vulnerability shielding
  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability


Crypto malware targeting ICS systems

No tags added.

Posted on 5 February, 2020 by Editor

EKANS ransomware actively targets certain products common in ICS environments.

Urgent/11 VxWorks vulnerabilities cause widespread exposure of Operational Technology

No tags added.

Posted on 8 August, 2019 by Editor

Easy-to-exploit vulnerabilities in VxWorks can impact physical safety, utilities, healthcare devices and more, setting the stage for widespread worm attacks.

NASA Jet Propulsion Lab hacked through unauthorized RPI

No tags added.

Posted on 26 June, 2019 by Editor

NASA’s Jet Propulsion Laboratory (JPL) was compromized through unauthorized Raspberry Pi device. 

Hacking Russia's power grid

No tags added.

Posted on 22 June, 2019 by Editor

U.S. Escalates Online Attacks on Russia’s Power Grid. 

Siemens Logo controllers critical vulnerabilities

No tags added.

Posted on 24 May, 2019 by Editor

Successful exploitation of these vulnerabilities could allow device reconfiguration, access to project files, decryption of files, and access to passwords. 
  • Page 2 / 9
  • 1
  • 2
  • 3
  • 4
  • 5