Veridify’s DOME™ platform protects existing Modbus devices, industrial controls (ICS/OT/SCADA) from cyberattacks. DOME provides “cybersecurity in a box” that delivers real-time protection and stops cyberattacks before they can happen. DOME can be deployed and managed by existing technicians without IT/cyber expertise. DOME works with Modbus and other industrial IP protocols.
2. Securing the Internet of Things™
Growing OT/ICS/SCADA Connectivity
Increases Cyber Exposure and Security Risks
• Operations
• Safety
• Ransomware
• Liability
3. Securing the Internet of Things™
Modbus Security Challenges
Modbus protocol was originally developed without security
(networks were air-gapped)
Device-to-device messages are inherently unsecure
Anyone that gets in or plugs into the network can:
• Discover network devices
• Watch and record all traffic
• See message types and details
• Inject commands
4. Securing the Internet of Things™
• Stops Cyber Attacks on OT Networks,
Buildings and Critical Infrastructure
• Cybersecurity “In a Box”
• Protects Devices at the Edge
• NIST Zero Trust Compliant
ISO 26262
ASIL D Certified
Developed in partnership with
Protects OT Devices
from Cyberattacks
5. Securing the Internet of Things™
DOME: Security Features
Authentication
Data Encryption
Secure Tunnels
Certificate Authority
6. Securing the Internet of Things™
DOME: Modbus Device Protection
Modbus TCP Modbus RTU
Protects devices on serial
trunks from attacks
originating on the IP
network
Protects IP network devices
from attacks originating on
a serial trunk
Protects individual devices
Protects devices behind
Modbus routers/gateways
7. Securing the Internet of Things™
DOME Dashboard DOME Interface
Appliance (DIA)
DOME Sentry
• Analytics
• Security Alerts
• Daily Status Email
• Manages Cloud Connection
• Device Management
• Credential Management
• Data Logging Capture
• STOPS Cyber Attacks
• Works with Installed Devices
• 100% NIST Zero Trust
• Zero Touch Onboarding
• Installs in <60 seconds
• No IT/Cyber Skills Needed
• Protects 1:1 and 1:Many
DOME supports “No Cloud Connectivity”
operation for secure Defense/Gov’t sites
DOME: “Cybersecurity in a Box”
8. Securing the Internet of Things™
DOME: Installation Benefits
System-driven approach improves speed
of implementation and eliminates errors
(e.g. automated certificates)
DOME Mobile App makes device
registration a simple “point-and-click”
process
Simplicity means no IT/Cyber expertise is
needed – installation by existing
technicians
9. Securing the Internet of Things™
DOME Mobile App™ Makes Installation Easy
No IT/Cyber Expertise Needed, No Manual Configuration
Select
Register Devices
Select Pre-Registered
Location
Scan QR Code Device Registered,
Security Credentials Auto-
Installed on Installation
10. Securing the Internet of Things™
Applying DOME in the Perdue Model
No IT/Cyber Expertise Needed, No Manual Configuration
Can be
implemented
from Levels 0-3
in the Purdue
Model
11. Securing the Internet of Things™
• Previous victim of a cyber attack
• IP-based riser trunks
• Serial-based floor trunks
• Entire OT network protected
with just 4 DOME Sentry devices
Example Deployment
32-Story Building in NYC
12. Securing the Internet of Things™
STOPS Cyber Attacks
• Real-time protection to the edge
• Only purpose-built solution for edge devices
Fully Packaged Cybersecurity Solution
• Eliminates need for IT / Cybersecurity resources
• Installs and protects in under 60 seconds
Works with New and Existing Devices
• Protection/Encryption between devices
• Supports commonly used IP network protocols
DOME: Cybersecurity Made Easy