Endpoint devices such as PLCs and Safety Instrumented Systems are known to have been victimized by malicious code; Stuxnet, Industroyer, and Trident are just some of the cyberattacks that have been conducted against endpoint devices. In each case, the malicious code commanded edge devices to operate in out-of-tolerance conditions, resulting in damaged equipment and dangerous situations.
Binary Armor employs a functional white-list capability to examine every byte of every command sent to edge devices, and only messages in the approved format with approved content are allowed to communicate with edge devices.