Suppliers Canada Wurldtech (GE Digital)
This profile is not managed yet, if you would like to manage
this profile, please contact us at
Edit This Vendor Record

Wurldtech (GE Digital)

Security for the Industrial Internet
< $10m
11 - 50
Open website
Wurldtech, a GE company, is in the business of protecting critical infrastructure from cyber attack. Wurldtech also provides consulting and professional services, as well as managed security services. Wurldtech helps operators and device manufacturers mitigate operational technology threats.

Wurldtech works with both device manufacturers and system operators to provide protection for critical infrastructure against persistent and dynamic cyber threats. Customers rely on Wurldtech products, services and certifications to help reduce the risks and costs of a cyber attack, maximize system uptime and meet compliance mandates.
Read More
Their flagship offering, OpSheild, provides defense-in-depth for ICS, SCADA and DCS environments. Their Achilles® product and certification programs have been widely adopted by both manufacturers and operators to deliver third party benchmark testing of product and system security.
Read More
Software that ingests data and visualises it to generate insights to answer specific questions
Platforms that facilitate and allow application developments for specific use cases and/or client requirements.
Software that focus on securing devices, machines, and communications between them.
Developing custom software for specific uses and operating environments/needs.
Number of Software2
OpShield, deployed inside your industrial or medical environment, maps, monitors, and can block unwanted traffic. Wurldtech gives you visibility into your device communications, then actively help keep your people safe, operations running, and assets undamaged.OpShield is fortified with an extensive set of ICS-specific vulnerability protection packs that are designed to thwart exploits that target OT vulnerabilities.Wurldtech’s OT threat research targets root vulnerabilities, not just exploit symptoms. Wurldtech researchers write vulnerability signatures that are long-lasting and can defend against exploit variants. This nuance is critically important. Traditional threat signatures are short-lived due to variants easily bypassing signatures. But vulnerability signatures can defend against new attacks--including zero-day attacks--that leverage the same root vulnerability.Combining this capability with well-researched OT protocol and device vulnerabilities delivers greater accuracy and broader protection.BASELINE NETWORK COMMUNICATIONSUpon installation, OpShield observes and records all OT communications to establish traffic patterns, allowing you to establish “what’s normal.” This becomes the baseline for network communications whitelisting, the strongest form of cyber security policy creation. Asset owners or system integrators then review and edit the policies, knowing that the majority of the work is already done by OpShield.These baseline and automated policy creation capabilities allow system operators to make informed decisions about the communications that transpire across their controls networks.NETWORK COMMUNICATIONS WHITELISTBuilding on the baseline, network communications whitelisting allows operators to block, allow, or simply alert on all traffic that doesn’t match an established policy. Operators gain more control and reduce complexity associated with unnecessary traffic.This approach to network communication control prevents attackers from misusing protocol commands, such as “shutdown,” “scan,” and “factory reset,” as well as parameters, such as “set point.” These commands and parameters exist in industrial protocols for good reason. But they can be dangerous when executed outside of the intended context.Whether for power generation, manufacturing, clinical healthcare or other critical infrastructure sectors, OpShield helps ensure that only the right commands for the right devices are executed.EASY OT NETWORK SEGMENTATIONSegmentation further helps reduce the attack surface.Unlike traditional IT VLANS or other segmentation techniques, OpShield’s drag-and-drop interface allows an operator to quickly segment an OT network, without the need to reconfigure or reengineer.It takes just a few minutes, yet can save hours, days or weeks in otherwise trying to contain malware or halt suspicious activity. Zone-specific whitelist policies also help minimize unexpected downtime by preventing lateral movement of ICS infections.Operators can easily apply fine-grain controls by associating whitelist policy with specific zones, or even zones within zones (nested zones).
Achilles Platform
Achilles Platform
The Achilles Test Platform (ATP) is a robustness test solution specifically designed for critical infrastructure devices. Finding faults and vulnerabilities early can save 10x or more in cost, versus discovering device problems after deployment.ATP has a virtual machine (VM) companion, Achilles Test Software, that enables widespread economical use. ATP is the only communications robustness test platform that can monitor both network and operational parameters, allowing vulnerabilities to be discovered, faults to be reproduced, isolated, identified and resolved before products are introduced to the market.Achilles® Test Platform- Tests communication robustness for industrial and automation devices (PLCs, DCS and others)- Validates performance and availability based on specifications- Discovers known and unknown vulnerabilities for remediation- Test implementation of industry protocols- Allows faults to be reproduced, isolated and identifiedAchilles Test Software- Delivers critical communication robustness testing via Virtual Machine (VM)- Enables widespread use to developers via economical form factor- Prepares, aligns, and conforms with industry standards
Number of Similar Suppliers8
Gambit Communications
Gambit Communications
Gambit Communications is a leader in network, IoT and SNMP simulation tools that enhance the productivity of management software developers and enterprise users while lowering their costs. MIMIC Simulator is a modular family of simulators used by leading networking vendors for use in applications from development and testing to operator training and disaster simulations. Gambit Communications' portfolio of over 1,000 customers around the world includes: IBM, CA, JP Morgan, VISA, Shell, US Army, US Air Force, Cisco, Apple, Starbucks, AT&T, Nokia.
GlobalSign Inc.
GlobalSign Inc.
GlobalSign is the leading provider of trusted identity and security solutions enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale PKI and identity and access management (IAM) solutions support the billions of services, devices, people and things comprising the Internet of Everything (IoE). The company has offices in the Americas, Europe and Asia.
Attinad Software
Attinad Software
Attinad Software is an industry leader in implementing end-to-end SMACT solutions for various verticals with a holistic approach.With a wide range of technological and domain expertise and practical SMACT experience, Attinad Software offers cutting edge products and services in the SMACT space. Attinad Software offers services ranging from SMACT Strategy and consulting to design, application development, implementation, maintenance and system integration. Attinad Software's core focus technologies are spread across Mobility, Business Intelligence and Analytics, Social Computing, Cloud Computing and IoT.Attinad Software has its headquarters in #335, NILA, Technopark, Trivandrum and a fully owned subsidiary, Attinad Software registered at SAIF Zone, Sharjah, UAE.
Download PDF Version
test test