OT Network design and deployment.
OT Network auditing, understand what devices are connected to your OT environment and what they speak to.
Change auditing, analyse ongoing change in your OT environment.
SOC/SIEM Integration, logging output, modelling and onboarding, developing use cases.
Incident Response, helping gather information on network events.
Virtualisation of obsolete OS to mitigate hardware issues.
Interpretation of pen test and vuln scan results, understand the risk presented to your environment from the vulnerablities present in it and options for mitigation. Note we do not actually carry out penetration testing but can provide this service via partners.
OT Network auditing, understand what devices are connected to your OT environment and what they speak to.
Change auditing, analyse ongoing change in your OT environment.
SOC/SIEM Integration, logging output, modelling and onboarding, developing use cases.
Incident Response, helping gather information on network events.
Virtualisation of obsolete OS to mitigate hardware issues.
Interpretation of pen test and vuln scan results, understand the risk presented to your environment from the vulnerablities present in it and options for mitigation. Note we do not actually carry out penetration testing but can provide this service via partners.