About Our Service

Detailed Risk Assessments of Your Industrial Networks.

Our Industrial Security Posture Analysis provides security teams with visibility and insights into your OT network’s security risk posture. Our industry-leading tool consumes a PCAP (packet capture) data file, collected from a network switch, and produces a comprehensive analysis of your ICS network.

Intelligence extracted from the OT protocols provides situational insights into existing vulnerabilities, network hygiene issues and possible misconfigurations, weak passwords, and unsecured connections or remote connections. Our analysis is fully passive and does not require installation of an agent on protected endpoint devices, and has zero impact on the OT network.

Our report provides a summary and detailed analysis of the assets and communications discovered on your industrial network, pinpoints vulnerable assets and resolutions, and uncovers network configuration and other “network hygiene” issues that can provide attackers a pathway or impact critical processes.

work
  • Deep Network Visibility
  • Non-Intrusive Assessment
  • Actionable Insights
  • Industry-Leading Expertise

Don't wait for a cyberattack to disrupt your operations.

  • Gain complete peace of mind with our comprehensive ICS/OT Industrial Security Posture Assessment. Schedule your consultation with us today!

Working process

Our consulting process is a systematic journey comprising four stages: Assessment and Analysis, Planning, Implementation and Execution, and Monitoring and Optimization.

01

Analysis and Planning

The process begins by thoroughly understanding the client's objectives.

02

Current State Evaluation

Identifying risks, recommending solutions, and creating actionable plans.

03

Implementation and Execution

Execute the project plan, which may involve deploying security tools, or managing critical projects.

04

Evaluation and Maintenance

Providing long-term security monitoring and maintenance to adapt to evolving threats.

bg logobg logo

News

Explore our newsroom

View More
Cybersecurity for Building Management Systems

Cybersecurity for Building Automation and Management Systems (BMS) and why it is important.

calendar_month
June 24, 2020
Taking Your Data Center Security to the Next Level

How to take your Data Center physical and cybersecurity to the next level with comprehensive security coverage.

calendar_month
February 24, 2021
Protecting Macau's Critical Infrastructure and Operations

How DDE is helping Macau companies comply with the new critical infrastructure cybersecurity law.

calendar_month
January 5, 2021
DDE Technology and the University of St Joseph, Macau

Stephen Berry, CEO of DDE Technology Lecture to University of Saint Joseph MBA Programme.

calendar_month
September 18, 2020
The Secret Life of Data Diodes

The secret life of data diodes. How data diodes are used to secure critical infrastructure and data flows.

calendar_month
November 19, 2020
arrowarrow
arrowarrow