Protecting IT and OT Convergence

As IT and OT networks converge, they enable greater production efficiency but also expose OT systems to increased cyber threats. PickPacket Interface Server is designed to protect the communication in both IT and OT/IACS domains.

Protect your IT and OT now with PickPacket

PickPacket Interface Server: First Line of IT/OT Defense

In today’s interconnected industrial environment, cybersecurity is crucial to safeguarding Industrial Automation and Control System (IACS) networks and ensuring continuous operations.

PickPacket Interface Server (PPIS) is engineered to enhance network segmentation, acting as a proactive first line of defense for IT and OT security teams.

It delivers a comprehensive solution that supports compliance with IACS security standards, including ISA99 and ISA/IEC 62443-4-1, while integrating smoothly into the Purdue Enterprise Reference Architecture (PERA) or any network framework.

  • Proactive Defense: Acts as the first line of protection against IT/OT security threats.
  • Deep Packet Inspection & Intelligent Filtering: Inspects traffic with criteria based on informed decisions and thorough packet validation.
  • Load-Balanced Nodes: Distributes heavy connection loads to maintain high performance and reliability.
  • Blueprint Protection: Masks and safeguards critical technology architecture from unauthorized discovery.
  • Centralized Encryption Management: Handles encryption certificates across the entire infrastructure with Post-Quantum Cryptography (PQC) ready.

Web Application Firewall

Protect your web applications from cyber threats with our advanced Web Application Firewall (WAF). It inspects incoming traffic, blocks malicious requests, and prevents attacks such as SQL injection, cross-site scripting, and other vulnerabilities. Designed for enterprise IT systems, it ensures business critical applications remain secure without affecting performance.

DAST and SAST Scanning

Identify vulnerabilities in your applications during runtime. Our combined Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST) scans help detect security flaws early, prevent potential exploits. Our Data Leak Protection solution monitors, detects, and blocks confidential information from leaving your network, ensuring compliance and safeguarding critical business assets.

Load Balancing Between Nodes

Distribute traffic intelligently across multiple sites to ensure high availability and reliability. Our load balancing solution optimises resource utilisation, prevents bottlenecks, and maintains uninterrupted access to applications, supporting seamless operations across your IT infrastructure.

Bandwidth Management

Control and prioritise network traffic to ensure optimal performance for mission critical applications. Bandwidth management allows you to allocate resources effectively, maintain smooth communication, and reduce the risk of network congestion affecting business operations.

Deep Packet Inspection

Industrial networks face constant threats targeting system and network vulnerabilities. Our Deep Packet Inspection is designed specifically for Industrial Automation and Control Systems (IACS), ensuring malicious traffic is detected without disrupting operations.

Network Segmentation and Zone Protection

Protect your critical control systems by separating networks into security zones. By controlling how external users and remote connections access Levels 0–2 of your ISA-95 environment, you reduce the attack surface, contain potential breaches, and ensure cyber threats are stopped before reaching essential systems.

Intrusion Detection and Anomaly Monitoring

Detect threats before they cause damage. Our solution continuously monitors your network and devices for abnormal behaviour such as malware, unauthorised commands, or unusual traffic patterns and logs events seamlessly to your SIEM for full visibility and compliance.

Secure Communication and Encryption

PickPacket Ensure all OT data is protected in transit. Our solution encrypts commands and telemetry, safeguarding integrity and confidentiality while preventing spoofing, eavesdropping, or command injection, in full alignment with IEC 62443 standards.

1903

Attack - Wireless Hack

Marconi Marconi's wireless telegraph presentation hacked with Morse code.

2000

Attack - Maroochy Water

A cyber-attack caused the release of more than 265,000 gallons of untreated sewage.

2010

Malware - Stuxnet

The world's first publically known digital weapon.

2010

Malware - Night Dragon

Attackers used sophisticated malware to target global oil, energy, and petrochemical companies.

2011

Malware - Duqu/Flame/Gauss

Advanced and complex malware used to target specfic organizations, including IACS manufacturers.

2012

Campaign - Gas Pipeline Cyber Intrusion

ICS-CERT identified an active series of cyber-intrusions targeting the natural gas pipeline sector.

2012

Malware - Shamoon

Malware used to target large energy companies in the Middle East, including Saudi Aramco and RasGas.

2013

Attack - Target Stores

Hackers initially gained access to Target's sensitive Fnancial systems through a third-party that maintained its HVAC ICSs, costing Target $309M.

2013

Attack - New York Dam

The U.S. Justice Department claims Iran conducted a cyber-attack on the Bowman Dam in Rye Brook, NY.

2013

Malware

Havex An ICS-focused malware campaign.

2014

Attack - German Steel Mill

A steel mill in Germany experienced a cyber-attack resulting in massive damage to the system.

2014

Malware - Black Energy

Malware that targeted human-machine interfaces (HMIs) in ICSs.

2014

Campaign - Dragonfly/Energetic Bear No. 1

Ongoing cyber-espionage campaign primarily targeting the energy sector.

2015

Attack - Ukraine Power Grid Attack No. 1

The first known successful cyber-attack on a country's power grid.

2016

Attack - Kemuri Water Company

Attackers gained access to hundreds of the programmable logic circuits (PLCs) used to manipulate control applications, and altered water treatment chemicals.

2016

Malware - Return of Shamoon

Thousands of computers in Saudi Arabia's civil aviation agency and other Gulf State organizations wiped in a second Shamoon malware attack.

2016

Attack - Ukraine Power Grid Attack No. 2

Cyber-attackers tripped breakers in 30 substations, turning off electricity to 225,000 customers in a second attack.

2017

Malware - CRASHOVERRIDE

The malware used to cause the Ukraine power outage was fnally identifed.

2017

Group - APT33

A cyber-espionage group targeting the aviation and energy sectors.

2017

Attack - NotPetya

Malware that targeted the Ukraine by posing as ransomware, but with no way to pay a ransom to decrypt altered Files.

2017

Malware - TRITON/Trisis/HatMan

Industrial safety systems in the Middle East targeted by sophisticated malware.