+7 (495) 777 2626
Ask a Question

Security systems

Infrastructure protection

VERYSELL's ad hoc VERYSELL ISA division does have the necessary knowledge and expertise to design and deploy a comprehensive security solution in a facility of scale and significance of infrastructure facilities.

Completed projects More

Infrastructure protection

VERYSELL’s  ad hoc VERYSELL ISA division does have required experience and competence to design and deploy a comprehensive security solution to protect even most sensitive  infrastructure facility. Our engineers have successfully completed a wide range of similar projects, in particular, in airports (South Africa, Moldova, Serbia), in seaports (Lithuania, Israel, South-East Asia), and at state borders (India, Poland, Ukraine, Macedonia).

While no solution grants 100% protection, we can speak of 95% threat detection rate. Our important advantage is compliance with industrial standards and technical requirements, as well as with local policies.

VERYSELL ISA’s team performs full-cycle projects including the following stages:

  • Detailed pre-project audit
  • Information analysis and risk assessment
  • Security system planning
  • Setup of security guidelines
  • Proof of concept development
  • Supply of hardware and equipment
  • Installation and commissioning (integration)
  • Staff training (system usage in compliance with guidelines)
  • Long-term maintenance services

Our solutions are built around customizable automated Manager of Managers system. It embraces latest data processing methods to provide a comprehensive image of the situation within the facility premises and around the adjacent territory.

Subsystems

  • Layered perimeter intrusion detection system (PIDS)
  • Cameras to monitor external territory and the perimeter
  • Access control and management system
  • Terminal/building monitoring and protection systems
  • Foot and mobile security forces
  • Information security
  • Communication and energy efficiency tools

 In the framework of each project subsystems are integrated according to customer requirements and facility particularities. A completed system ensures maximum situational awareness in real time.

Completed projects Быстрый запрос

Airport security

VERYSELL’s ad hoc VERYSELL ISA division does have required experience and competence to design and deploy a comprehensive security solution in a facility of scale and significance of a modern airport.

Completed projects More

Airport security

If the Tower of Babel were to be built nowadays, it would have more chance to survive. Automated systems would exclude manual labor while modern security solutions would prevent any confusion at the construction site.

Of course, the Babel is but a fabulous legend (pun intended), yet, the modern world somewhat embodied it in the shape of modern airports. It is a melting pot where confusion takes place 24/7, as people from all over the world cross it en route for business or leisure, let alone the turnover of goods. Miracle for a layman, streamlined airport operations represent daily routine of professionals. Given elevated and obvious risks, most sensitive areas include safety and security of people, cargo and of the overall airport infrastructure.

VERYSELL’s  ad hoc VERYSELL ISA division does have required experience and competence to design and deploy a comprehensive security solution in a facility of scale and significance of a modern airport. Our engineers have successfully completed a wide range of similar projects worldwide.

While no solution grants 100% protection, we can speak of 95% threat detection rate. Our important advantage is compliance with aviation standards and technical requirements, as well as with local policies.

VERYSELL ISA’s team performs full-cycle projects including the following stages:

  • Detailed pre-project audit
  • Information analysis and risk assessment
  • Security system planning
  • Setup of security guidelines
  • Proof of concept development
  • Supply of hardware and equipment
  • Installation and commissioning (integration)
  • Staff training (system usage in compliance with guidelines)
  • Long-term maintenance services

Our solutions are built around customizable automated Manager of Managers system. It embraces latest data processing methods to provide a comprehensive image of the situation within the facility premises and around the adjacent territory.

Subsystems

  • Layered perimeter intrusion detection system (PIDS)
  • Cameras to monitor external territory and the perimeter
  • Access control and management system
  • Terminal/building monitoring and protection systems
  • Foot and mobile security forces
  • Information security
  • Communication and energy efficiency tools

Functions and Options

  • Integration of all monitoring devices within the comprehensive system
  • Accurate display of detected items on the GIS-driven map
  • Automated pointing of suitable devices at the detection area
  • Measure-taking (situation management) in compliance with the set of predefined guidelines

 In the framework of each project subsystems and functions are integrated according to customer requirements and facility particularities. A completed system ensures maximum situational awareness in real time.

Completed projects Быстрый запрос

Seaports security

VERYSELL’s ad hoc VERYSELL ISA division does have required experience and competence to design and deploy a comprehensive security solution in a facility of scale and significance of a modern seaport.

Completed projects More

Seaports security

Were VERYSELL present at the 18th century US market, no Boston Tea Party could have ever happened. Why? Well, the Boston Harbor would have been equipped with our security system rendering the whole event impossible.

Sounds immodest, while history is not fond of subjunctives, so let us get back to the present days and simply tell that VERYSELL’s  ad hoc VERYSELL ISA division does have required experience and competence to design and deploy a comprehensive security solution in a facility of scale and significance of a modern seaport. Our engineers have successfully completed a wide range of similar projects, in particular, in Lithuania, South-East Asia and Israel.

While no solution grants 100% protection, we can speak of 95% threat detection rate. Our important advantage is compliance with industrial standards and technical requirements, including those of the International Ship and Port Facility Security (ISPS) Code, as well as with local policies.

VERYSELL ISA’s team implements full-cycle projects including the following stages:

  • Detailed pre-project audit
  • Information analysis and risk assessment
  • Security system planning
  • Setup of security guidelines
  • Proof of concept development
  • Supply of hardware and equipment
  • Installation and commissioning (integration)
  • Staff training (system usage in compliance with guidelines)
  • Long-term maintenance services

Our solutions are built around customizable automated Manager of Managers system. It embraces latest data processing methods to provide a comprehensive image of the situation within the facility premises and around the adjacent territory.

Subsystems

  • Layered perimeter intrusion detection system (PIDS)
  • Cameras to monitor external territory and the perimeter
  • Access control and management system
  • Terminal/building monitoring and protection systems
  • Foot and mobile security forces
  • Information security
  • Communication and energy efficiency tools

Functions and Options

  • Integration of all monitoring devices within the comprehensive system
  • Accurate display of detected items on the GIS-driven map
  • Automated pointing of suitable devices at the detection area
  • Measure-taking (situation management) in compliance with the set of predefined guidelines

 In the framework of each project subsystems and functions are integrated according to customer requirements and facility particularities. A completed system ensures maximum situational awareness in real time.

Completed projects Быстрый запрос

Cybersecurity for ICS

To help protect your industrial control system(s) VERYSELL will design and deploy a hardware/software PICS complex uniquely built for your plant.

Completed projects More

Cybersecurity for ICS

Year 2015 is responsible for 295 industrial cyber incidents (ICS-CERT). This represented a 20 percent increase over year 2014. The Critical Manufacturing Sector nearly doubled to a record 97 incidents, becoming the leading sector in 2015. The Energy Sector had the second most incidents with 46 incidents, and the Water and Wastewater Systems Sector was third with 25. On average, each incident caused USD100k of losses for every company involved.

 

The number of vulnerabilities in ICS components keeps growing. With increased attention to ICS security over the last few years, more and more information about vulnerabilities in these systems is becoming public. However, the vulnerabilities themselves could be present in these products for years before they are revealed. In total, 189 vulnerabilities in ICS components were published in 2015, and most of them are critical (49%) or have medium severity (42%). Vulnerabilities are exploitable. For 26 of the vulnerabilities published in 2015, exploits are available. Besides, for many vulnerabilities (such as hard-coded credentials) an exploit code is not needed at all to obtain unauthorized access to the vulnerable system. Our ICS security assessment projects show that ICS are often considered by their owners as “black boxes”, so default credentials in ICS components are often not changed and could be used to gain remote control over the system.

 

Information security audit involves the following tasks:

  • Preparation of information security audit plan and roadmap;
  • ICS data collection and analysis (technological process, network, using security controls, staff interaction, incident response, configures of security controls, operations management, technical documents);
  • Analysis of the results of previously conducted threat modeling and penetration tests (if conducted);
  • Building ICS  Threat Model.

 

Information security system design

The second step is to design an ICS protection system and operation management procedures. Information security controls choosing in accordance with threat model. Design and operation management procedures needs to address the lack of permanent staff responsible for information security.

Organizational and technical IS measures should be correlated with industrial, physical, fire, ecological and other ICS security measures, also they should not have a negative impact on regular ICS operation mode (efficiency, technical parameters, reliability). IS system should consider the relevance of threats from external and internal attacker.

PICS

Hardware & software complex PICS is designed to provide a comprehensive approach to ICS security. Reduction of the risks of the ICS (industrial control systems) entering emergency state in case of attacks, preservation of the critical infrastructure systems operability, elimination disadvantages of the current security devices are the main objectives for PICS. 

PICS is a powerful solution to detect and prevent unauthorized access into information infrastructure of automated control system for various industrial and technological processes.

Due to the new approach and unique protection technologies, PICS has a number of advantages over the regular means of intrusion prevention implemented by the equipment manufacturers.  PICS fully protects ICS at low levels of architecture, minimizing negative consequences of attempts to breach ICS integrity (substitution of data (packets), changing the settings, software and other attributes and other activities prejudicial to ICS).

PICS has a number of unique features:

  • vulnerabilities detection (search);
  • analysis of industrial control protocols;
  • detection of hidden malicious actions during data exchange;
  • accurate and timely attack localization (indicating location of the attacked host).

Narrow focus of the protection means achieving comprehensive security of automated control systems of technological processes and specialized equipment at all levels of ICS.

Completed projects Быстрый запрос