Our goal is security in industry
We provide specific technology and services that help to fortify industrial environments and protect critical infrastructures. We implement defence in depth strategies based on our experience in the industrial and infrastructure sector and on updated knowledge of the existing threats.
Services in Industrial Cyber Security
Perimeter security and network segmentation
The basic aspect for protecting your industrial and infrastructure environment.
Policies and Procedures
Creation and standardisation of security processes.
Secure network architecture
Secure industrial network management and access.
Training and awareness raising
The first step towards cyber-secure industrial environments.
Secure by Design
Technologies with native security
The 3 pillars of industrial cyber security.

Systems
It is advisable to incorporate specific systems related to network segmentation into OT environments, with analysis and management of events related to security, etc.

Processes
Policies, procedures and programmes need to be established to help fortify industrial and infrastructure environments.

People
Multidisciplinary teams (Red Teams) need to be created to be capable of identifying possible threats and vulnerabilities, managing the ISMSs and adapting the processes proposed in the reference standards and documents to each specific plant.
Cyber Security news
Our latest blog entries.
Non-invasive intrusion and network anomalies detection systems and BlackEnergy3
As pointed many times, to increase the operations security levels, it’s not enough to add preventive countermeasures…
Design of zones and conduits according to the IEC 62443 (ISA99) standard in Industry 4.0
Logitek leveraged JNIC (Jornadas Nacionales de Ciberseguridad), an event that took place last year in Granada (Spain), to introduce the article and keynote “Design of zones and conduits according to the IEC 62443 (ISA99) standard in Industry 4.0”. This article...
OT networks segmentation and fortification: the data diode
The addition of devices to fortify the perimeter access and the correct network segmentation is one of the basic countermeasures to be considered within a deep defense strategy. Why is network fortification so relevant? The lack of devices than enable a secure access...






Do you think your infrastructure is cyber secure?
Here’s what we mean: have you detected the main deficiencies or weaknesses associated with your OT (Operations Technology) environment that could cause your production system to shutdown or crash? If not…