Automation and computerization have brought a new perspective on security to the industrial sector. Since 2015, Citadelo has carried out security audits for industrial control systems (SCADA) and related infrastructure..
We have devoted ourselves to the topic of industrial control system (ICS/SCADA) security for a number of years. We have carried out comprehensive projects including a full range of testing techniques and methods such as reverse engineering, GSM communications module testing, hardware component security analysis, protocol analysis, static analysis of source code, and auditing of industrial business logic..
Citadelo has rich experience in the field of industrial control systems (ICS), also known as SCADA. Penetration testing helps to unveil vulnerabilities in control systems, thus protecting your know-how and guarding manufacturing processes against costly downtime.
If you operate your own servers and network infrastructure, we recommend periodic security verification. Leaks of employee or customer data or your corporate know-how can have a severe impact on your business and reputation. In addition to testing, we also offer consulting and security monitoring services.
By means of a penetration testing security audit we will unveil any security vulnerabilities in your network. The audit simulates an attack from inside your network environment undertaken by an employee with ordinary user permissions and not further acquainted with the internal infrastructure or running applications.
By means of a penetration testing security audit we will unveil any security vulnerabilities in your network. The audit simulates an attack from outside your network and uses a “black box” approach starting with no knowledge of the architecture, available systems, and applications, and without any user permissions.
In addition to traditional IT infrastructure, we also work with devices and web services in the “Internet of Things” category. Today, IoT and smart devices are installed in homes, corporations, and industrial settings, but the security risks connected with them are severely underappreciated.