Ultra Intelligence & Communications


On-Demand Webinar: Protecting Legacy Endpoints with Certified Cybersecurity

Many devices that are used to monitor and control critical infrastructure weren’t designed with security in mind, making them vulnerable to cyberattacks. Protecting these edge devices is key to ensuring reliable operations, and that is driving interest from DoD organizations in bolt-on technology. 

On-Demand Webinar: Cybersecurity Tips for OT Networks

Learn how to prevent cyber-attacks that preserve and protect operations using high-efficiency approaches to securely implement true end-to-end embedded security. These strategies work with current operational systems and secure all devices connected to a network without sacrificing productivity and safety standards.

On-Demand Webinar: Virtual Perimeter Monitoring for Defense-in-Depth Security

Perimeter-monitoring systems are not created equal. Today’s surveillance solutions require deeply layered defenses to reliably connect and protect data control networks and critical systems. Learn how the DoD is utilizing a certified platform in critical infrastructure installations, and how you can too.

On Demand Webinar: Understanding Deep Packet Inspection (DPI) Firewalls

Learn how to attain full operational awareness against cyber-attacks without impacting system efficiency. Resident expert Matt Cowell will cover topics including enhanced visibility and controls to fill the voids left by existing ICS devices and technology.

Building Stronger, Smarter Industrial Control Systems

Learn how new thinking in ICS design is advancing architectures that can withstand both malicious attacks and unintentional cyber incidents.

Monitor & Respond: The Power of the Big Picture

Maximum visibility into network operations means power. A 360-degree view allows operators to identify critical events, pinpoint the source of problems, and respond quickly.

Authentication & Remote Access: Don’t Trust, Verify

Protocols used in ICS environments generally lack inadequate network service authentication. Operators must use only validated cryptographic technology and flexible monitoring modes.

Reducing Your Attack Surface: Take Back Control

It is vital that security measures that are deployed do not interfere with operations, but you can control the playing field. Ensure that only necessary and approved communications occur between known devices, and set boundaries.

Application Whitelisting: Friend or Foe

Whitelisting methods are effective and add powerful protection where firewalls cannot. A 3eTI expert discusses proactive malware detection and hacking prevention through AWL defenses that leave operations fully intact.

DNP3 Issues and Vulnerabilities

DNP3 is a critical yet complicated protocol which provides a big target to cyber-attackers intent on disrupting operations. Numerous vulnerabilities threaten reliable and safe industrial controls as well as availability. Standard security tools just can’t mitigate the risks.