Endpoint Security bg

Endpoint Security

Endpoint devices such as PLCs and Safety Instrumented Systems are known to have been victimized by malicious code; Stuxnet, Industroyer, and Trident are just some of the cyberattacks that have been conducted against endpoint devices. In each case, the malicious code commanded edge devices to operate in out-of-tolerance conditions, resulting in damaged equipment and dangerous situations.

Binary Armor employs a functional white-list capability to examine every byte of every command sent to edge devices, and only messages in the approved format with approved content are allowed to communicate with edge devices.

Back To Top