ES EN    Do you have an active incident? Contact DFIR

OT SECURITY DIVISION

Cybersecurity in IoT is not optional. As more everyday objects and business systems connect, it is essential to design, configure, and maintain these devices with a security-by-design mindset, involving manufacturers, users, and cybersecurity professionals.

ADVANCED SOLUTIONS FOR PROTECTING OT/IoT DEVICES

OT / IoT NETWORK DIAGNOSTICS

What is it about?

Identifies, inventories, and prioritizes cyber risks in your OT/IoT network. We use advanced methodologies such as NIST 800-82 and IEC 62443 to provide a detailed analysis and an effective action plan to improve security.

Contatc us for more information

Benefits:

  • Discovered asset inventory

  • Detailed network diagram

  • Vulnerability identification and classification

  • Security recommendations

Network Segmentation

What is it about?

We isolate and protect your high-value assets through network segmentation solutions, creating a secure infrastructure for your OT network.

Contact us for more information

Features:

  • Secure site-to-site VPN

  • DMZ to prevent infection spread

  • Custom L2 and L3 security rules

Network Micro-segmentation

What is it about?

Ensures the security of your operations with granular controls, detecting threats in real time and blocking potential attacks.

Contact us for more information

Benefits:

  • Real-time threat detection

  • Continuous protection against scanning and flood attacks

ICS Endpoint Protection

What is it about?

Protects the endpoints of your ICS systems without affecting production operations, ensuring cybersecurity never interrupts routine operations.

Contact us for more information

Benefits:

  • Security without slowing systems down

  • Compatibility with both legacy and modern systems

Portable Inspector

What is it about?

Scans and removes malware on isolated computers and systems without the need for installation or reboot.

Contact us for more information

Benefits:

  • Autonomous malware detection and removal

  • Works on both Windows and Linux devices

Use Cases

Practical Applications of Our Solutions

Asset Inventory:
A continuously updated inventory of all network assets, including OT and IoT systems. This should be updated at least monthly to maintain effective control.

Vulnerability Mitigation:
Aligned with the CISA catalog of exploited vulnerabilities, we prioritize critical vulnerabilities and use compensatory controls (such as segmentation and monitoring) for OT assets where traditional patching may not be viable.

Threat Detection and Relevant TTPs:
Create and maintain a documented list of specific threats, along with their Tactics, Techniques, and Procedures (TTPs), to detect and manage threats that may affect operational security.

Contact us for more information

Network Segmentation:
Strict control of access to the OT network using firewalls and demilitarized zones (DMZs). Only required connections are allowed, limiting unauthorized access and protecting critical assets.

Limit Internet Connections:
Ensure OT assets are not connected to the public Internet unless necessary. Any Internet connection must be justified and include additional security measures, such as multifactor authentication and proxies.

Disable Unnecessary Features by Default:
Policy to disable unnecessary features (e.g., macros in Microsoft Office) on all devices by default. Only specific services are enabled under controlled conditions, reducing the risk of unauthorized software execution.

Contact Our Division

The Anti‑Fraud Unit is based on a consultative approach to understand each organization’s specific priorities and challenges, working together to optimize fraud prevention and detection processes.

9 + 13 =