Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability

Blog

Air-gap jumping attack tools

No tags added.

Posted on 28 June, 2017 by Administrator

Brutal Kangaroo used by CIA to jump air-gaps (access the blog entry for the link)

Crash Override (Ukranian Power Grid) variant in the wild

No tags added.

Posted on 14 June, 2017 by Administrator

Variants of the malware that was used to attack the Ukranian powergrid are now found in the wild. (access the blog entry for the link)

Irongate reduces visibility with MitM tricks

No tags added.

Posted on 9 November, 2016 by Administrator

Irongate ICS malware masks malicious activity on SCADA systems (access the blog enrty for the link)

POC rootkit targets PLC's

No tags added.

Posted on 9 November, 2016 by Administrator

POC rootkit reduces observability on PLC's (access the blog entry for the link)

‘Operation Ghoul’ Targets Industrial, Engineering Companies

No tags added.

Posted on 22 August, 2016 by Administrator

Targeted attacks against small and midsized engineering and industrial sector businesses motivated by financial gain. (access the blog enrty for the link)
  • Page 3 / 6
  • 1
  • 2
  • 3
  • 4
  • 5