Our vulnerability research team focuses on devices and software that control critical infrastructure.
With expertise in ICS, SCADA, DCS and related embedded devices, our research team is deeply entrenched in finding and understanding the latest issues in control systems and software.
Whereas other research groups typically identify and track exploits, we reverse engineer technology to identify the root cause of an ICS vulnerability, and write signatures to specifically address the vulnerability. This way, signatures that have long-life efficacy, and much more comprehensive protection from exploit variants than common threat signatures.
Each pack contains signatures for the latest control system vulnerabilities facing critical infrastructure operators. We focus on what could most harm operations: 95% of our protections address high- or medium-severity vulnerabilities.We group vulnerability signatures as protection packs deployed at least monthly to your OpShield devices. This is how we provide ongoing, robust, high fidelity protections to device operators.