Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • Micro-segmentation
  • Vulnerability shielding
  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability


Cryptocurrency Malware Mining Attack on ICS systems

No tags added.

Posted on 12 February, 2018 by Editor

Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack   http://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack

Triton malware targets Safety Instrumentation Systems (SIS)

No tags added.

Posted on 14 December, 2017 by Editor

New malware attacking Schneider Triconex SIS   https://www.wired.com/story/triton-malware-targets-industrial-safety-systems-in-the-middle-east/

Energy company plant engineers actively targeted

No tags added.

Posted on 8 July, 2017 by Editor

The FBI-DHS has issued an “amber” alert warning that energy companies have been actively targeted since May. (access the blog entry for the link)

Air-gap jumping attack tools

No tags added.

Posted on 28 June, 2017 by Editor

Brutal Kangaroo used by CIA to jump air-gaps (access the blog entry for the link)

Crash Override (Ukranian Power Grid) variant in the wild

No tags added.

Posted on 14 June, 2017 by Editor

Variants of the malware that was used to attack the Ukranian powergrid are now found in the wild. (access the blog entry for the link)
  • Page 4 / 7
  • 2
  • 3
  • 4
  • 5
  • 6