Seclab acquired Seckiot in 2024 — hardware isolation meets software visibility
Seclab and Seckiot together cover the Discover and Segment phases of the Bizsecure OT security framework. Seckiot brings passive OT & XIoT asset discovery and threat detection software. Seclab brings hardware-enforced network segregation and physical isolation. One partner — the full stack from visibility to isolation.
Seckiot Explore — OT & XIoT Asset Discovery
The first step toward robust OT cybersecurity. Seckiot Explore is a passive, agentless platform that maps your entire OT and XIoT network without impacting operations — collecting traffic via SPAN port or network TAP for a complete, dynamic picture of every asset and flow.
- Passive agentless asset discovery — no impact on OT networks
- Full equipment inventory: name, type, manufacturer, firmware, IP/MAC, protocols
- Network topology mapping — Purdue model aligned
- Real communication flow matrix & event logging
- Vulnerability detection & proactive weakness identification
- IEC 62443 and NIS2 compliant
Seckiot Citadelle — OT Threat Detection & Monitoring
Real-time supervision and proactive threat detection for critical OT infrastructure. Seckiot Citadelle uses behavioral analysis and machine learning to detect unknown threats, IoC signatures for known attacks, and MITRE ATT&CK ICS-aligned detection — before incidents impact operations.
- Real-time OT network monitoring & 360° visibility
- Behavioral analysis — ML-based unknown threat detection
- IoC signatures & updated threat database
- MITRE ATT&CK ICS-aligned detection rules
- Contextualized alerts — reduced false positives
- Integrates with SIEM, Stormshield, PAM, and SOC tools
Network Segregation & Physical Protocol Breaks
Hardware-based IT/OT network separation through electronic protocol breaks and bi-directional data diodes. Traffic is terminated at the protocol level on the IT side and re-initiated on the OT side — no direct network path exists between environments, making lateral movement physically impossible.
- Electronic Protocol Breaks — physical network separation
- Bi-directional data diodes for controlled data flow
- OT monitoring data export to IT SIEM (one-way)
- Ruggedized hardware for industrial environments
- Bypass Cluster for high-availability plants
USB Segregation & Removable Media Control
Removable media is one of the most common OT attack vectors. Seclab’s USB decontamination stations scan, sanitize, and content-disarm all removable media before entry into the OT environment — with full audit logs for every transfer.
- USB Segregation — decontamination stations
- Malware scanning & Content Disarm & Reconstruction (CDR)
- File format whitelisting
- Full audit trail for every media transfer
- Lockdown for unauthorized removable media
One partner. Software visibility + hardware isolation.
Seclab’s 2024 acquisition of Seckiot creates a unique single-vendor capability — the only solution that combines OT asset discovery and threat detection software with hardware-enforced physical network isolation. Together they deliver a complete Discover → Segment solution for critical infrastructure operators.
Software Layer — Seckiot
Passive OT/XIoT asset mapping, vulnerability management, behavioral anomaly detection, and real-time threat monitoring — without touching a single OT device.
Hardware Layer — Seclab
Protocol-level hardware separation, data diodes, and USB decontamination — physical enforcement of IT/OT boundaries that software-only solutions cannot provide.
Talk to our OT security specialists about Seclab + Seckiot for your industrial environment.
