Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability

Blog

Israel’s Electric Authority hit by ‘severe’ cyber-attack

No tags added.

Posted on 29 January, 2016 by Administrator

Looks like we will see more of this (access the blog enrty for the link) in the coming months

Attacks against Ukranian power grid

No tags added.

Posted on 5 January, 2016 by Administrator

Power outages in Ukraine caused by malware (access the blog enrty for the link)

SSH Keys reuse vulnerabilities

No tags added.

Posted on 7 December, 2015 by Administrator

Reused SSH keys threatening ICS devices (access the blog enrty for the link)

McAfee Labs Threat predictions for 2016

No tags added.

Posted on 18 November, 2015 by Administrator

Check out McAfee's take on IoT security: "Gateways will need to improve to support the IoT..." here (access the blog enrty for the link)

Dell Cyber Security Annual Threat Report

No tags added.

Posted on 20 April, 2015 by Administrator

<p>SCADA / ICS attack trends picked up by Dell - click <a href="https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf">here</a> (access the blog enrty for the link)</p>  
  • Page 5 / 6
  • 2
  • 3
  • 4
  • 5
  • 6