SIGA @ Energie report

ARES's CEO Jürgen Weiss spoke to the Energie Report  magazine and told them about the many solutions they offer, amongst he discussed SIGA's unparalleled offering for promoting OT cybersecurity. Check-out the full online Energie Report  magazine here (Mr. Weiss's interview is on pages 12-14): Webpaper (report.at) Is your organization cyber resilient? No? Contact Us - SIGA (sigasec.com)  
קרא עוד

SIGA’s CRO, Amir Gil speaks at ICS 7th edition

SIGA's CRO, Amir Gil spoke at ICS 7th edition held on the 20th of November. Mr. Gil discussed the importance of monitoring the process level in order to detect cyber-attacks that will otherwise go unnoticed. He demonstrated how Level 0 can make a difference and provide operators with unmatched situational awareness to act upon cyber threats quickly and effectively. SIGA's many installations have proved that what SIGA sees in unseen by other solutions, allowing organizations to capitalize on the information coming directly from their critical assets to gain full visibility and promote their cyber resilience to a whole new level.
קרא עוד

SIGA @ SPS 2022

SIGA participated at the Smart Production Solutions (SPS) conference in Germany along with our great partner, Phoenix Contact. SIGA's DACH sales manager, Markus Stadelhofer along with SIGA's Sales VP, Amir Kandell were delighted to meet key players from many industries and showcase how Level 0 can promote cyber resilience to a whole new level.
קרא עוד

SIGA’s CEO speaking at a major Water industry event

SIGA’s CEO, Amir Samoiloff attended a unique roundtable gathering water experts from across the US to discuss the many challenges faced by the industry. SIGA is honored to collaborate with water companies to ensure they gain visibility directly from Level 0 to protect their provision of this scarce resource.
קרא עוד

PARALLEL REFERENCE MONITORING

HMI’s Can be Fooled! Detect anomalies before they damage your critical assets. SIGA’s Parallel Reference Monitor (PRM) provides multi-level real-time monitoring, revealing otherwise undetectable Level-0 attacks BACKGROUND Current security methods for industrial control systems are beginning to evolve and include network-level security, some use of firewalls, unidirectional diodes and protected gateways. This vulnerability and common operational constraints lead to very limited solutions, at best. Therefore, the SCADA’s controller level, or Level 1 as it is called in the Purdue Model (e.g., PLC, RTU, etc.) can be compromised in various scenarios.   An attacker has taken control of a critical process while a perfectly normal operational status is reflected on the HMI and other levels. The attack is allowed to continue undetected because the control ...
קרא עוד