Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • Micro-segmentation
  • Vulnerability shielding
  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability

Blog

Crash Override (Ukranian Power Grid) variant in the wild

No tags added.

Posted on 14 June, 2017 by Administrator

Variants of the malware that was used to attack the Ukranian powergrid are now found in the wild. (access the blog entry for the link)

Irongate reduces visibility with MitM tricks

No tags added.

Posted on 9 November, 2016 by Administrator

Irongate ICS malware masks malicious activity on SCADA systems (access the blog enrty for the link)

POC rootkit targets PLC's

No tags added.

Posted on 9 November, 2016 by Administrator

POC rootkit reduces observability on PLC's (access the blog entry for the link)

‘Operation Ghoul’ Targets Industrial, Engineering Companies

No tags added.

Posted on 22 August, 2016 by Administrator

Targeted attacks against small and midsized engineering and industrial sector businesses motivated by financial gain. (access the blog enrty for the link)

SCADA malware at Energy Company

No tags added.

Posted on 22 July, 2016 by Administrator

SFG creates a backdoor to the energy grid (access the blog enrty for the link)
  • Page 4 / 7
  • 2
  • 3
  • 4
  • 5
  • 6