Customised Solutions
Do you need to tailor a solution to meet your specific challenges? In a project together with you, we can develop a customised solution!
We offer customisation of existing solutions or development of new solutions including one or more of our products or in collaboration with products from other suppliers!
Examples of our customised solutions
Here are some examples of customised solutions we have done for other customers.
Two way communication solutions
For the following protocols we have made protocol validators/filters.
ICCP/TASE.2
The risk of attacks against ICCP servers is high and can have severe implications. Protecting the ICCP server mitigates the attacker’s possibility to propagate the attack over the network and special solutions are needed to do so.
Read more about this solution.
Zabbix
Zabbix is an open-source software used to monitor IT equipment such as servers, network equipment, virtual machines, etc. With a strict communication using CDS solutions, attacks can be prevented.
Read more about this solution.
Remote Desktop
Many organisations depend on remote access through RDP to allow suppliers to perform maintenance, or so that operating personnel can monitor and control a system. Secure remote access solves many of the security risks that are otherwise associated with such solutions.
Read more about this solution.
MySQL
MySQL is a relational database management system (RDBMS) frequently used within IT/OT integrations.
Oracle TNS
Oracle TNS is a proprietary Oracle computer-networking technology often used by other services in IT/OT integrations.
One-way communication solutions
The following protocols have been implemented to ensure functionality together with a data diode.
HTTP unidirectional
By placing a data diode between Splunk Forwarder and Splunk HEC (HTTP Event Collector), it is ensured that this communication is strictly one-way and thus prevents the central log collection from affecting the monitored systems.
Read more about this solution.
GIS
Geographic Information Systems (GIS) can integrate with, and retrieve data from, systems for supervisory control and data acquisition (SCADA). However, there is a risk that Operational Technology (OT) systems and their operations can be disrupted by threat agents targeting the data flows between IT and OT. With the right solutions, allowed data can flow between IT and OT without risking the sensitive OT environment.
Read more about this solution.
Historian
Using supported scripts in the Aveva Historian environment we have exported signals from a Historian instance to a file which then was transferred using our data diodes. The exported file was then automatically imported into another Aveva Historian instance, replicating the signal over the data diode.
Contact us
If you did not find the customer solution you were looking for, you can contact us: