Achilles Threat Intelligence Software
Achilles® Threat Intelligence Software is comprised of Wurldtech protection profiles and rulesets, coupled with industry-leading Intrusion Protection Systems / Intrusion Detection Systems (IPS/IDS) to provide perimeter protection to control systems. With Achilles Threat Intelligence Software, Wurldtech and its partners can provide protection against newly found vulnerabilities within days of discovery.
Wurldtech Achilles Threat Intelligence Software protects mission critical connected devices and systems against newly discovered attacks within days of discovery, and without the need to shut down operations to implement a patch. Wurldtech protection protocols and rulesets, coupled with industry-leading Intrusion Protection Systems (IPS / IDS) provide protection to mission critical control systems.
Working with 8 of the world’s top 10 Automation suppliers plus key Operators (Asset Owners), Wurldtech discovers and analyzes new and ever-changing vulnerabilities. From those vulnerabilities Wurldtech develops the protection profiles and rulesets for commercial IPS/IDS.
Benefits for Operators
With Achilles Threat Intelligence Software, Operators of critical infrastructure implement a mitigation to a vulnerability within days of discovery, without patching or shutting down operations, reducing their exposure to risk and protecting their brand equity.
Benefits for Partners
By partnering with Wurldtech and integrating Achilles Threat Intelligence Software into their IPS/IDS offerings, Wurldtech’s security industry Partners gain access to the Industrial Control market, increasing system unit sales and average price.
Wurldtech brings focused Industrial Control System expertise, experience, technology and operator and device manufacturer relationships to its development of protection profiles and rulesets. Wurldtech has the industry’s most comprehensive database of non-public (zero-day) Industrial Control vulnerabilities. Our profiles and rulesets address the complete vulnerability, not just the single exploit.
Wurldtech Achilles Threat Intelligence Software contains multiple rule types:
- Vulnerability Rules – Focused on specific vulnerabilities in specific products
- Public Vulnerabilities – ICS-CERT reports, independent researchers, open-source attack tools
- Private Vulnerabilities – Identified during Wurldtech private research, Root Cause Analysis, operator assessments and certifications
- Policy Rules (Function Control) – Manage the use of designed features that can be abused. Allow enforcement of best practice policy
Protocol Normalization Rules (Anomaly Detection) – Prevent a common class of vulnerabilities due to ambiguities and legacy functionality in protocol specification
Rule Set coverage
Wurldtech rulesets cover products of the following vendors and product type:
Wurldtech rulesets cover the following protocols:
Wurldtech Achilles Threat Intelligence Software is available through: