Mercury is a software-based suite of native ICS cybersecurity products which is truly hardware-agnostic. Mercury products can be deployed using customer prefered appliances. For full functionality and interoperability we recommend modern Intel or ARM architectures with Linux-based platforms. In any case, if you have a different use case, our engineers can customize our products and adapt them to your specific needs. Deploy Mercury cybersecurity products is easy and fast. You don't need to change any existing configuration or IP. Mercury products are transparent to the existing ICS network. Our ICS Encryption is unique and we can encrypt and protect your data and traffic at Layer 2 adding negligible latency to the existing industrial process and with no impact to the communications from PLCs to SCADA.

#

Mercury Edge

Protect your legacy PLC, HMIs and SCADAS with an easy-to-deploy and cost-effective solution. Now is possible to protect legacy ICS infrastructure and extend its life-cycle to improve the return of your investment. Avoid the costs of replacing everything and the risks related to downtime. Mercury Edge is a “plug&protect” appliance compatible with all vendor PLCs and industrial protocols. Mercury Edge does not require to change any IP or any existing configuration. Mercury Edge is directly compatible with your devices and network. Forget about complex, expensive and even sometime impossible PLC updating process and forget about replacing your entire infrastructure.

Features:

  • Universal appliance compatible with all vendor PLC and protocol
  • Easy to deploy (plug&protect)
  • Do not require to change any existing IP or configuration
  • Layer 2 encryption for transparent ICS traffic data protection
  • Hide your devices by obfuscation adding encryption layer
  • Mitigate any existing vulnerability
  • Add connectivity and extract traffic data via LTE/3G/4G to SIEM and analytics tools

Mercury UTM

Mercury Unified Threat Management (Mercury UTM) is a complete cybersecurity suite delivering advanced security features compatible with any existing ICS/OT infrastructure. Deploy Mercury UTM and protect your existing infrastructure in conformity with IEC-62443 and protect your most valuable and strategic assets before connecting it to the Internet. Mercury UTM has been designed with industrial CIOs and CISOs and has been validated by world-class industrial companies.

Features:

  • Network Assets Inventory
  • Network Segmentation
  • Micro-segmentation at PLC level
  • Firewall
  • Conduits definition
  • Device hardening
  • Transparent Layer 2 Encryption
  • Integration with IDS, SIEM, SOC, and analytics

Mercury DC

Mercury Data Collector (Mercury DC) is best-in-class data collector enabling data management and ownership from the data source to where the data is consumed. Easy to deploy and cost-effective, Mercury DC allows you to extract data in a fast, secure, and reliable way. Mercury DC adds connectivity and security to existing ICS infrastructure, and it is fully compatible with existing configurations and devices.

Features:

  • Connectivity: extract data from everywhere
  • Security: PKI integration and encryption
  • Reliability: add mutual authentication to warrant data quality from data source
  • Fast: low-latency encryption adding less than 1ms to the existing process thanks to our unique encryption method
  • Interoperable: native integration with analytics and monitoring tools

ICS Encryption

Enigmedia offers a unique encryption technology for ICS and OT environments. Industrial protocols at floor plant are not-encrypted because current encryption standards add not-acceptable latency to the industrial process. Low-latency is a must when ciphering industrial protocols. Our encryption technology is the world-fastest encryption and it adds less than 1 millisecond (!) to the existing process. Enigmedia’s technology keeps highest security levels as it uses a key length of 256bits. Our encryption is the perfect security tools to protect industrial processes, protocols, TSN, and 5G communications. If you have an encryption challenge, we can overcome it. Please contact us to discover how you can integrate our core technology into your devices and processes.

Features:

  • Connectivity: extract data from everywhere
  • Security: PKI integration and encryption
  • Reliability: add mutual authentication to warrant data quality from data source
  • Fast: low-latency encryption adding less than 1ms to the existing process thanks to our unique encryption method
  • Interoperable: native integration with analytics and monitoring tools

Mercury Remote EWS

One of the biggest challenge in ICS cybersecurity is to protect the Engineering WorkStation (EWS) from malicious code that may compromise the workstation. Mercury Remote EWS creates an authenticated and encrypted channel between the engineering computer used by the operator and the EWS. Use Mercury Remote EWS and keep the EWS totally isolated and secured from attacks.

Features:

  • Authentication
  • PKI Integration
  • Encryption
  • Remote Desktop
  • Isolate the EWS and protect from compromised computers

Supported vendors

We want to hear from you

Tell us your ICS/OT cybersecurity challenge.

Enigmedia creates native ICS cybersecurity products. Please contact us to discover how we can enhance your cybersecurity position mitigating your cybersecurity risks and reducing your exposure.

We are the right partner to overcome your industrial cybersecurity challenges. Contact us to schedule a demo or to talk to our cybersecurity experts.

We are proud members of