Critical national infrastructure
security
Many modern industrial and CNI infrastructures rely on simple devices and embedded computers sending telemetry signals, receiving control messages, and connecting the physical world to a digital representation. The increasing number of cybersecurity risks turn telemetry data and control messages into another kind of sensitive data that needs protection.
We have built secure systems that protect telemetry data in huge state-owned enterprises. Our solutions fit both state-owned TSOs and SCADA networks and simple IoT environments, and allow achieving compliance with ISO 27k, NIS, CAF, ICS, ETSI EN 303 645.
CNI industry challenges
Legacy systems
The abundance of legacy hardware and industry standards that are only semi-compatible with the modern stack.
Vendor-locked solutions
Multi-component systems are built on "vendor-locked" solutions that don't provide enough flexibility and security management.
Successfull cyberattacks
A constantly increasing number of successful attacks on critical infrastructure objects, which leads not only to financial loss but also to electricity blackouts and halts in manufacturing processes.
Availability is king
Historically, CNIs were all about availability and air-gapped security. Now we're in a very different world, trying to cross the gap between legacy and ultra-modern systems.
Modern CNI security solutions
Focus on a dataflow
Hardware-based data encryption that follows the dataflow – protects the data starting with its generation sources.
Bridging legacy
Integrating security layers to cross the gap between legacy and ultra-modern systems, preserving security and stability.
High throughput and availability
Demand for real-time available data is growing, so modern security solutions for CNI have to be optimised for a higher load.
Our offerings
// Relevant products
Acra
A DATABASE SECURITY SUITE
Acra's SCADA/ICS kit
ENCRYPTION FOR INDUSTRIAL SYSTEMS
// Custom design and implementation
Integration with custom hardware
Specialised security modules
Multi-layered security systems
Have a question? Get a human to answer it!
How we make a difference
Fast & compliant crypto
Our solutions are based on FIPS 140-2 compliant cryptographic libraries, and they are tailored to work fast on cheap microcontrollers.
Experience in country-scale systems
Our solutions already work in highly distributed infrastructures in country-level enterprises and provide complete software&hardware solutions for data protection.
SCADA-aware
Our tools support the typical SCADA protocols for direct integration with existing legacy hardware, extracting and encrypting telesignal data "on the fly".
Adaptable to telemetry and telemechanics
Our solutions are optimised for storing and processing the time-series organised telemetry data securely & efficiently.
Our mission is simple.
We help you focus on serving your customers better, while relieving your team from security engineering pains and making your users confident that their data is safe with you.
Contact us
There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:
Relevant blogposts
Shared responsibility model in cloud security: mind the gap
Security responsibility of cloud providers: where it ends, what are the gaps, and what steps your team should make to improve cloud security strategy.
TLS certificate validation in Golang: CRL & OCSP examples
All developers need to know about using OCSP and CRL for validating TLS certificates in Go apps. Things we’ve learnt while building our own OCSP/CRL validation tooling: design, implementation and security tips, example code and popular mistakes.