Ticking the feature boxes
- Asset management
- Anomaly detection and response
- Security management
- Network-based security
- Identity and access management (IAM)
- Near endpoint-based security
- Supported through specialist OT security consulting, integration and managed services
Splice's radical design approach gives 100% visibility of OT traffic, allowing for unique features such as:
- Vulnerability shielding
- API strenghtening
- Secure remote access
- Virtual network level patching
- Black box flight recorder
- Cloud capability
The Splice controller is responsible for configuration and management of Splice and the overlay network. Security settings for supernodes, site cloaks and OT devices behind these cloaks are managed from the controller.
Machine Learning and AI algorithms are offloaded to the Splice controller in order to keep intensive compute resources from impacting the overlay network.
One or more Splice supernodes are required. These form the core of the parallel path encrypted overlay network, and it is where the in-core isolation and traffic inspection is performed. Multiple supernodes provide high availability and redundancy.
Splice cloaks are available in various form factors, suitable for geographically distributed applications, harsh environmental conditions, high density OT sites and low density OT sites.
Dual-brain cloaks are optional. These cloaks have independent processors, power and network wiring. Should one of the dual-brain cloaks fail (or failure of the underlay network supporting the brain), the primary brain releases access to the OT network in favor of the secondary brain.