Meet Industrial Control System (ICS) Requirement

One of the biggest problems in ICS is, which were the infrastructure is planned before any cyber-attacks existed and it is not possible to use IPS (Intrusion Prevention System) or WAF (Web Application Firewall) in the network firewall as it will cause more problems than an actual intrusion.

Protect your ICS now with PickPacket

About PickPacket

In today’s business world Cybersecurity has becoming more critical in assuring Safety and Availability needs of Industrial Control System (ICS) networks and processes. There is nothing worse for a company that remotely supports customers than to introduce malware into a customer’s network.

The PickPacket Interface Server (PPIS) was built to arm security teams with the protection they need for the Purdue Enterprise Reference Architecture (PERA) as the first line of defance.

  • ICS Standard and met ISA99 and ISA/IEC 62443 requirements in Purdue Enterprise Reference Architecture (PERA)
  • The first line of defense, block and prevent Malware and Web Application Security Risks
  • Load balance internal servers to manage traffic
  • Protect and hide technology blueprint from detection
  • Block access to certain restricted content
  • Centralized SSL/TLS management

Intrusion Filter

For years, attackers have assailed network and system level vulnerabilities, fueling demand for products like firewalls and intrusion detection systems. We provide low-level and high performance Intrusion Filter (IF) and Industrial Control System (ICS) compatible solutions.

Load Balancing

We offers as very efficient distrubute traffic to several application servers and to improve performance, scalability and realiability of web applications.

Zero Trust

At its core, Zero Trust is a security model and design philosophy that assumes any user or device could be a potential threat. Its goal is to remove the inherent trust that is granted to users in traditional 'castle and moat' style architectures.

Initial Audit

What is your operating efficiency? Are your security measures up to standard? We‘ll evaluate your current ICS security environment and make recommendations

1903

Attack - Wireless Hack

Marconi Marconi's wireless telegraph presentation hacked with Morse code.

2000

Attack - Maroochy Water

A cyber-attack caused the release of more than 265,000 gallons of untreated sewage.

2010

Malware - Stuxnet

The world's first publically known digital weapon.

2010

Malware - Night Dragon

Attackers used sophisticated malware to target global oil, energy, and petrochemical companies.

2011

Malware - Duqu/Flame/Gauss

Advanced and complex malware used to target specfic organizations, including ICS manufacturers.

2012

Campaign - Gas Pipeline Cyber Intrusion

ICS-CERT identified an active series of cyber-intrusions targeting the natural gas pipeline sector.

2012

Malware - Shamoon

Malware used to target large energy companies in the Middle East, including Saudi Aramco and RasGas.

2013

Attack - Target Stores

Hackers initially gained access to Target's sensitive Fnancial systems through a third-party that maintained its HVAC ICSs, costing Target $309M.

2013

Attack - New York Dam

The U.S. Justice Department claims Iran conducted a cyber-attack on the Bowman Dam in Rye Brook, NY.

2013

Malware

Havex An ICS-focused malware campaign.

2014

Attack - German Steel Mill

A steel mill in Germany experienced a cyber-attack resulting in massive damage to the system.

2014

Malware - Black Energy

Malware that targeted human-machine interfaces (HMIs) in ICSs.

2014

Campaign - Dragonfly/Energetic Bear No. 1

Ongoing cyber-espionage campaign primarily targeting the energy sector.

2015

Attack - Ukraine Power Grid Attack No. 1

The first known successful cyber-attack on a country's power grid.

2016

Attack - Kemuri Water Company

Attackers gained access to hundreds of the programmable logic circuits (PLCs) used to manipulate control applications, and altered water treatment chemicals.

2016

Malware - Return of Shamoon

Thousands of computers in Saudi Arabia's civil aviation agency and other Gulf State organizations wiped in a second Shamoon malware attack.

2016

Attack - Ukraine Power Grid Attack No. 2

Cyber-attackers tripped breakers in 30 substations, turning off electricity to 225,000 customers in a second attack.

2017

Malware - CRASHOVERRIDE

The malware used to cause the Ukraine power outage was fnally identifed.

2017

Group - APT33

A cyber-espionage group targeting the aviation and energy sectors.

2017

Attack - NotPetya

Malware that targeted the Ukraine by posing as ransomware, but with no way to pay a ransom to decrypt altered Files.

2017

Malware - TRITON/Trisis/HatMan

Industrial safety systems in the Middle East targeted by sophisticated malware.