Ticking the feature boxes

  • Asset management
  • Anomaly detection and response
  • Security management
  • Network-based security
  • Identity and access management (IAM)
  • Near endpoint-based security
  • Supported through specialist OT security consulting, integration and managed services

Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:

  • Micro-segmentation
  • Vulnerability shielding
  • API strenghtening
  • Secure remote access
  • Virtual network level patching
  • Black box flight recorder 
  • Cloud capability

News

SSH Keys reuse vulnerabilities

No tags added.

Posted on 7 December, 2015 by Editor

Reused SSH keys threatening ICS devices (access the blog enrty for the link)

McAfee Labs Threat predictions for 2016

No tags added.

Posted on 18 November, 2015 by Editor

Check out McAfee's take on IoT security: "Gateways will need to improve to support the IoT..." here (access the blog enrty for the link)

Dell Cyber Security Annual Threat Report

No tags added.

Posted on 20 April, 2015 by Editor

<p>SCADA / ICS attack trends picked up by Dell - click <a href="https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf">here</a> (access the blog enrty for the link)</p>  

Quarterly ICS-CERT report

No tags added.

Posted on 16 March, 2015 by Editor

<p>The ICS-CERT Monitor quarterly report is now available <a href="http://www.dell.com/learn/us/en/uscorp1/press-releases/2015-04-13-dell-annual-threat-report">here</a> (access the blog enrty for the link)</p>  

NIST ICS Security Guide revised

No tags added.

Posted on 27 February, 2015 by Editor

The final draft of the NIST Guide to Industrial Control System (ICS) Security is now available here (access the blog enrty for the link)
  • Page 7 / 7
  • 3
  • 4
  • 5
  • 6
  • 7