Firmitas Cyber Solutions
Firmitas’ solution is the world’s first and only adaptable communication enforcer
כ"ס, ישראל
-->
אודותינו
Firmitas provides a next-generation Adaptable Operational-Security solution. A new approach for cyber-defense based on process-oriented security rather than information or data security. Instead of creating antidotes to specific threats it works by enforcing a system's predefined design. Thus, making unexpected attacks infeasible and ensuring system up-time.
Firmitas’ ValidiGate is a disruptive attack-prevention solution providing operational assurance and security for industrial and mission-critical systems. Thus, enabling the protected systems to operate deterministically under any condition, from Smart-Meters to Nuclear Reactors.
Firmitas’ technology enforces each system’s pre-defined operational-envelop by ensuring only pre-approved states and functionality which are necessary for the specific operation, significantly reducing the attack-surface.
Firmitas’ ValidiGate is a disruptive attack-prevention solution providing operational assurance and security for industrial and mission-critical systems. Thus, enabling the protected systems to operate deterministically under any condition, from Smart-Meters to Nuclear Reactors.
Firmitas’ technology enforces each system’s pre-defined operational-envelop by ensuring only pre-approved states and functionality which are necessary for the specific operation, significantly reducing the attack-surface.
שפות
אנגלית
שפת אם
עברית
שפת אם
תחומי התמחות
טכנולוגיה
אבטחת מידע ורשתות
Firmitas, Firmitas Cyber, Firmitas Cyber Solutions, Firmitas Infographic, Firmitas Infographics, Firmitas Cyber Infographics, Industrial Cyber, Network Security, Mission-Critical Systems, Smart-Grid Security, OT Security, Cyber Defense, Graphical System Description, Signature-Less, Device-Side Protection, Protection By Prevention, SCADA Security, IoT Security, IoT Cyber-Security, Real-Time Monitoring, Maximum Visibility, Operational Assurance, Deterministic Decisions, Deterministic Security, Industrial Cyber-Resilience, Support Any Vendor, cyber defense, device-side protection, firmitas, firmitas cyber, firmitas cyber infographics, firmitas cyber solutions, firmitas infographic, firmitas infographics, graphical system description, industrial cyber, iot cyber-security, iot security, mission-critical systems, network security, ot security, protection by prevention, real-time monitoring, scada security, signature-less, smart-grid security
Internet of Things / IoT
IoT Security, IoT Cyber Security, IoT Firewall, IoT Message Validation, Industrial IoT Security, Industry 4.0 Security, Firmitas IoT Protection
Cyber Security סייבר
Firmitas, Firmitas Cyber, Firmitas Cyber Solutions, Firmitas Infographic, Firmitas Infographics, Firmitas Cyber Infographics, Industrial Cyber, Network Security, Mission-Critical Systems, Smart-Grid Security, OT Security, Cyber Defense, Graphical System Description, Signature-Less, Device-Side Protection, Protection By Prevention, SCADA Security, IoT Security, IoT Cyber-Security, Real-Time Monitoring, Maximum Visibility, Operational Assurance, Deterministic Decisions, Deterministic Security, Industrial Cyber-Resilience, Support Any Vendor, cyber defense, device-side protection, firmitas, firmitas cyber, firmitas cyber infographics, firmitas cyber solutions, firmitas infographic, firmitas infographics, graphical system description, industrial cyber, iot cyber-security, iot security, mission-critical systems, network security, ot security, protection by prevention, real-time monitoring, scada security, signature-less, smart-grid security
נסיון תעסוקתי
אוקטובר
2014
-
היום
Firmitas Cyber Solutions
Firmitas Cyber Solutions , כפר סבא, ישראל- In essence, Firmitas’ solution allows an easy and intuitive definition of the target-system’s correct and expected behavior – defined as the system’s Communication-Model. From that Communication-Model, a set of enforcement rules is automatically derived which is than deployed on the system/device-side providing stand-alone protection of the target-system regardless of the system implementation, and regardless of the network topology and configuration.
- By allowing to easily configure the tailor the protection per type of system, and even per specific deployment/configuration, Firmitas’ solution provides Adaptable Operational Security, rather than “one-size (does not) fit all” approach found in many other technologies and products aiming to secure critical systems.
- By strictly enforcing only pre-defined communication and behavior, Firmitas’ solution ensures Deterministic Protection by Prevention, as fitting deterministic operational systems.
- The system is intended to be used by Equipment Vendors and System Integrators to describe target-systems to be protected. The resulting security enforcement product of the definition process, is than deployed to protect the end-customers’ systems.
- We believe that our unique solution can protect mission-critical systems, since such systems have rather static communication model.
- In such cases, we can significantly enhance their security by strictly enforcing only pre-defined communication protocols and communication-logic.
פטנטים וקניין רוחני
System and method of generating a secured communication layer
PCT/IL2015/050669- Techniques for generating a secure communication layer for a certain software application in a computer system are disclosed. The certain application is configured and operable to exchange data via a communication interface using a specific protocol implementation. A communication protocol model is generated for the specific protocol implementation based on input data about the specific communication protocol and being associated at least in part with functioning of the certain application. The generated communication protocol model is used for generating a dedicated protection layer component corresponding to the specific communication protocol, wherein the dedicated protection layer component is capable of analyzing communication traffic data associated with the certain application and validating communication traffic data addressed to the certain application and complying with the generated protocol model.
Method and system for modifying messages based on user-defined communication model
20170099322- Techniques for generating a secure communication layer for a certain software application in a computer system are disclosed. The certain application is configured and operable to exchange data via a communication interface using a specific protocol implementation. A communication protocol model is generated for the specific protocol implementation based on input data about the specific communication protocol...
פרסום פרויקט