Solutions to manage cyber risk within control and safety systems.

  • Control Vault

    Control Vault

    Initially designed as a repository for project documentation, now uses Retrieval-Augmented Generation (RAG) for Domain-Specific AI tuning to build a model of your asset as a powerful tool to help with your cybersecurity program

  • Industrial Comms

    Industrial Communications

    Cybersecurity Risk Assessments workshops or CHAZOP studies can be carried out either remote facilitation or on-site as required. We specialise in both existing site or greenfield project sessions.

  • Protocol Converters

    Protocol Converters

    A design analysis usually takes two phases, an initial first pass during early FEED, followed by a final assessment before detailed design. We can guide your MAC Vendor to ensure security is baked into the design right from the start.

  • System Testkits

    System Testkits

    From our experience, summerising risk to people and equipment is a difficult task, especially from older assets. We have developed methods to quantify risk to help Insurance assessments to correctly assess the risk level saving money on premiums.

  • Asset Database

    Asset Database

    You can’t protect what you don’t know you have. One of the hardest tasks in securing your OT asset base is the inventory register. This is at the very heart of any cybersecurity program. Intrusive scanning of networks may work at Level 2 or 3 but Level 1 can be problematic. We have developed systems to accelerate discovery of all of your automation infrastructure