Splice evolves the Purdue model principles into a specialised ICS Secure Access Edge, protecting Operational Technology networks by providing:
- logical isolation in the network core
- vulnerability shielding inside an encrypted overlay network
- secure identity management
- logical isolation in the network core
- vulnerability shielding inside an encrypted overlay network
- secure identity management
Splice initially operates in an out-of-band mirror mode and transitions to edge and in-path modes at your own pace. Splice has been specifically designed to require no or minimal reconfiguration or interruption to existing production processes, allowing you to take back control over insecure and legacy components.
Download the Splice brochure for your industry
Today’s OT networks need to strike a balance between the convenience of convergence and the ability to maintain observability, operability and controllability (i.e. OT security). There are many points in OT security architecture design where these attributes are likely to be targeted.
Security weaknesses found in the control network and field devices are likely to be around for some time yet. Splice secures the OT network with a new approach to logical isolation, control enhancement and behavioural monitoring. This means that investments already made in vulnerable legacy devices and systems will not expose the entire operation.
Review the demo videos or contact us for a private demonstration.
Retail, Healthcare and Property Management reference architecture
The diagram to the left depicts a Splice deployment covering an embedded device environment typically found in Property Management, Retail and Healthcare.
Critical Infrastructure, Mining, Oil and Gas reference architecture
The deployment model to the right is an example of the architecture design for Sensor Networks and SCADA installations typically found in Critical Infrastructure, Mining and Oil and Gas. Splice is deployed with a highly redundant architecture and runs in mirror mode. The Splice overlay network is available as a contingency and can be moved to in-path mode if the network is under attack
Flexible Deployment Options
Splice caters for a number of flexible deployment architectures, embracing or completely avoiding Cloud capabilities as determined by customer risk appetite. Zero-touch deployments are also available to allow for rapid visibility during incident response scenarios.
Flexible Deployment Options
Splice caters for a number of flexible deployment architectures, embracing or completely avoiding Cloud capabilities as determined by customer risk appetite. Zero-touch deployments are also available to allow for rapid visibility during incident response scenarios.
Flexible Deployment Options
Splice caters for a number of flexible deployment architectures, embracing or completely avoiding Cloud capabilities as determined by customer risk appetite. Zero-touch deployments are also available to allow for rapid visibility during incident response scenarios.
Flexible Deployment Options
Splice caters for a number of flexible deployment architectures, embracing or completely avoiding Cloud capabilities as determined by customer risk appetite. Zero-touch deployments are also available to allow for rapid visibility during incident response scenarios.