Protocol Security Gateway

Stop Data Communication Intruders In Their Tracks

If your investment / infrastructure is controlled or monitored using a system which uses a data communication protocol such as BACnet/IP then it is vulnerable to attack. Depending on the attack and the equipment being controlled the attack can cause permanent and critical damage and harm. Other protocols have similar vulnerabilities and similar risk profiles. For example. Modbus/TCP.

How can you really protect against this?

If one person can change a set point or change an operating parameter then so can any one else!

The Protocol Security Gateway can stop intruders in their tracks by preventing read requests and write commands passing from one side of the gateway to the other unless authorized.

Authorization is done for one / any combination of a number of controls such as limiting who can read or write what data during which time period.

Full Audit Trails, Reports Intruder attempts The Protocol Security Gateway can provide audit reports: who changed what and when. It can also provide intruder reports and email designated personnel when attempts are made to make unauthorized changes.

protocolsecuritygateway.png

Next:  Business Plan

Contact Us

Contact us via phone (+1 866-383-1657) or leave a detailed message below for sales, support, or any other needs

*Required Field
*Required Field
I'd like to receive the newsletter. *Check email for confirmation.
*Required Field
8:00am - 12:00pm 12:00pm - 5:00pm