Invite a Co-worker
Send a co-worker an invite to the Exchange portal.Just enter their email address and we’ll connect them to register. After joining, they will belong to the same company.
Send Invite Cancel
73862members
331293posts

Mercury Cipher

Enigmedia
Mercury Cipher
Mercury allows secure data collection, communications protection, remote access, network segmentation, firewalling, and intrusion detection becoming the perfect tool for industrial customers looking for ways to secure their digital transformation process with efficiency and best ROI. Mercury is composed by Mercury Ciphers (hardened industrial gateways deployed on the OT network), and Mercury Orchestrator (a web-based tool conceived for the configuration and management of Mercury Ciphers). Mercury builds up a virtual private industrial network to enjoy all the benefits of connectivity while protecting industrial networks from cyber threats. Depending on the use case and the cybersecurity challenge, Mercury is deployed in the OT network in different strategic locations: connected to port mirror for secure data collection; deployed to connect remote sites through authenticated and encrypted channels; or deployed inline to create secure zones and define firewall in conformity with IEC-62443
Enigmedia
Mercury Cipher
Mercury allows secure data collection, communications protection, remote access, network segmentation, firewalling, and intrusion detection becoming the perfect tool for industrial customers looking for ways to secure their digital transformation process with efficiency and best ROI. Mercury is composed by Mercury Ciphers (hardened industrial gateways deployed on the OT network), and Mercury Orchestrator (a web-based tool conceived for the configuration and management of Mercury Ciphers). Mercury builds up a virtual private industrial network to enjoy all the benefits of connectivity while protecting industrial networks from cyber threats. Depending on the use case and the cybersecurity challenge, Mercury is deployed in the OT network in different strategic locations: connected to port mirror for secure data collection; deployed to connect remote sites through authenticated and encrypted channels; or deployed inline to create secure zones and define firewall in conformity with IEC-62443
Sort by:
Sort by:

No content available