OT / ICS Security

Industrial systems
aren't an afterthought. They're the differentiator.

Most platforms treat OT as a checkbox. We probe 11 industrial protocols safely, fingerprint 30+ vendor families, build a persistent device inventory that tracks firmware drift over time, and map every finding to IEC 62443, NERC CIP, and NIST 800-82.

11
Industrial Protocols
Pure-Python, Read-Only
30 +
OT Vendor Families
OUI Fingerprinted
3
Compliance Frameworks
62443 · NERC · NIST
1.5
CycloneDX SBOM
Export & Import
Protocol Coverage

Eleven protocols, zero impact.

Pure Python probes. No external tool dependencies. Read-only safe by design — no writes, no resets, no production disruption.

Modbus
PLC communication
S7comm
Siemens controllers
EtherNet/IP
Rockwell / ODVA stack
BACnet
Building automation
DNP3
SCADA / utilities
OPC UA
Modern OT interop
FINS
Omron PLCs
Fox
Tridium Niagara
CODESYS
IEC 61131-3 runtimes
SNMP
Network device mgmt
IEC 61850
Substation automation
Vendor Coverage

The vendors that run the world.

MAC OUI fingerprinting identifies device families across 30+ industrial vendors. Persistent inventory tracks vendor, model, firmware, serial, hardware version, exposed protocols, zone, and criticality.

Siemens
Rockwell
Schneider
ABB
Honeywell
GE
Omron
Phoenix Contact
Beckhoff
Moxa
Advantech
WAGO
+ 18 more
Compliance

Mapped to the standards auditors actually ask about.

IEC 62443

Zone-and-conduit segmentation, security level mapping, and asset criticality classification mapped to every finding.

NERC CIP

Critical Infrastructure Protection cyber asset categorization and electronic security perimeter visibility.

NIST 800-82

Industrial control system security guidelines with mapped controls for ICS-specific risk treatment.

Why It Matters

Read-only, written by operators.

Safe by design.

ICS networks have been brought down by curious nmap scans. Our probes are pure Python, send only what they need, and never write to the device. If a probe could destabilize a controller, it isn't in the platform.

Built by people who've been there.

The team behind SeverityZero spent 20+ years assessing critical infrastructure — from substations to manufacturing floors to water treatment plants. The OT module exists because we kept getting asked for it, and nothing on the market did it right.

SBOM in, SBOM out.

CycloneDX 1.5 import for known asset inventories, export for downstream consumption. Firmware change tracking shows version history per device — when it changed, what changed, and what new CVEs apply.

Industrial systems,
protected continuously.

See your OT exposure mapped, scored, and ready for audit. We'll walk you through the full module — including a dry-run on a non-production segment if you want.