Defending our critical infrastructure from hackers.
Knowing that someone active is exploiting and hacking your internal Industrial systems right now, can reduce the overall impact, damage and potential loss from the incident..
What if you could have a early warning on such attack...?
Even better, - what if the attacker was wasting precious time to attack a believable decoy, rather that the real infrastructure... while you gets the required time to respond and stop the attack!
Welcome to the world of DEFENICA
DEFENICA = DEFENd Industrial Control Assets, and that’s what we do.
It's all about securing, what important to our everyday life - critical infrastructure sectors, Industrial control system (ICS) and SCADA (Supervisory Control and Data Acquisition) - who supports our every-day life. We do offer a numbers of ICS/SCADA deception solutions & threat feeds; to help the following industries;
Energy (Electric power, Oil & Gas, Wind and Nuclear)
Transportation (Rail, Air)
Water and waste water management
Other types of industrial manufacturing (e.g Food, Beverage, Recycling)
Areas of Practice
WHat's A Honeypot?
A honeypot sensor are a "fake" system, designed to let unsuspecting hackers trying to breach the information security, while recording everything to alert your team that a incident has happen ! Click here for more information
Do you have the responsibility for critical infrastructure - no deception technology like honeypots to warn you, when something out of the ordinary are happen? - then this in-house honeypot system are something you need !
ICS SCADA Threat feeds
A honeypot sensor are a "fake" system, designed to let unsuspecting hackers trying to breach the information security, while recording everything to research the tactics, techniques, and procedures (TTP) a attacker would use to take control over critical infrastructure. Click here for more information
ICS/SCADA vulnerabilities signatures
We do also offers ICS/SCADA vulnerabilities signatures - ready to be used in standard Intrusion Detection Systems (IDS) like SNORT. Please contact us for more information
Learn how to plan, build and deploy honeypot systems in our intense practical classes - available as per-conference, open and private classes. Click here for more information