IoT
6/8/2017
03:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

MSi Launches Latest Edition of MSi Platform

Mission Secure, Inc. (MSi), a provider of cyber defense solutions for control systems operating critical assets in defense, energy and transportation, launched the latest evolution of the patent-pending MSi Platform. This version adds innovative features and functionality to the three core components (MSi Console, Sentinel and MSi 1.) The Platform is designed to protect (not just monitor) against a myriad of attacks including ransomware, APT and zero day attacks.

Unprecedented Cyber Visibility AND Protection at Levels 0-2
As a platform, the MSi components form a security solution for the control system devices and provide operator visibility, security monitoring, incident detection, operator alerting, encryption, protective blocking, trusted machine data gathering for forensics and the ability to insert corrective commands to maintain a safe state. The platform offers protection from malicious commands that originate inside the open protocols of the OT system architecture, starting at Levels 0 and 1 up to levels 2+ (Purdue Cyber Security Reference Model).

Military Strength and Industrial Grade
The patent-pending MSi Platform successfully passed an independent, month-long cyber assessment by the highly regarded Arizona Cyber Warfare Range, and received additional seals of approval from numerous government and commercial organizations focused on control system cyber security. Built for harsh industrial and defense environments, the hardware is industrial grade, rated from minus 40 degrees to plus 80 degrees Celsius, mean time to failure of 13+ years, DIN Rail mounted supporting multiple OT protocols, digital and analog, serial and Ethernet communications.

"We keep hearing 'nothing like this exists in the OT or ICS space, especially at this price point.' 'This is really unique,'" said David Drescher, CEO and Co-founder of Mission Secure, Inc. "We are delivering affordable, defense in depth to the OT, IIoT and control system world on hardened, secure hardware that embeds at the component level and customers love it."

In addition to protective features, the MSi platform removes the blind spot hampering other ICS cyber security solutions (as recently highlighted in the renowned process control magazine, Control Global, article) by tapping into the digital and analog signals to read and verify the true state of the underlying process.

Whether you are a customer looking to extend cyber security protection down to the controllers and components in the OT environment and verify the systems and processes are running as reported, a partner integrating leading edge solutions for the OT, or an OEM adding next generation cyber protections to your hardware, we have something for you at MSi.

Learn more about specific features and functionality of the MSi Platform, receive a brochure, watch short videos and/or schedule a demo by visiting us at www.missionsecure.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11354
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
CVE-2018-11355
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
CVE-2018-11356
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
CVE-2018-11357
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
CVE-2018-11358
PUBLISHED: 2018-05-22
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.