The VCL “Beyond the Firewall” cyber-security solutions are designed to assist organizations to
detect, prevent and secure their network against firewall breaches, cyber-attacks, ransomware-attacks, DoS attacks, conduct forensic analysis and
trace the attack route in real-time. Most network administrators rely solely on a “Firewall” to secure their IP networks. Some network administrators
also deploy an additional “Network Traffic Sniffer” which monitors and flags the transmitted and received data traffic anomalies. However, very few
network administrators actually plan for an eventuality after a “Firewall” has been breached and the “Network Traffic Sniffer” has recorded data
VCL Cyber-Security products assist network administrators to conduct forensic analysis, trace the attack route, identify existing
network vulnerabilities and implement a “real-time” counter-measure defence strategy which automatically comes into effect in the event of a
cyber-attack / firewall breach. VCL advanced and comprehensive cyber defence solutions generate audio-visual alarms, to automatically switching
to a redundant network / to a redundant firewall, as well as to isolate the network and protect the critical infrastructure assets in case of a
cyber-attack / firewall breach / DoS attack.
VCL-MX-5010-R-ES is an integrated IEC-61850 compliant ruggedized router with enhanced security equipment with advanced features
that may be installed to secure critical infrastructure such as utilities, sub-stations, smart-grid distribution systems, airports and railways as
well as IT Networks of financial institutions such as banks and corporate networks.
VCL Network-MouseTrαpTM is an essential network security tool that sits behind the firewall
in a secure environment to detect firewall breaches and unauthorized intrusions in an network. VCL Network-MouseTrαp™ is an advanced “honeypot” / “decoy server”
that can be programmed by the user to emulate various types of IEDs such as Protection Relays, RTUs or Payment Gateways etc.
VCL provides a comprehensive “Beyond the Firewall” cyber security solutions that designed to assist organizations
to prevent and secure their network against firewall breaches and cyber-attacks in real-time. The VCL-2702, Network Isolation (Kill) Switch is
one such element that forms a part of the cyber security suite of products that are offered by VCL.
VCL-2142 Enigmatron Xcöde is low data rate encryption equipment with extremely advanced features to secure
and protect RTU data in critical infrastructure, Smart Grid Distribution Systems, Oil and Gas Infrastructure and Railway Signalling Networks.
It provide secure communications between multiple RTU Terminals and their corresponding IEC 60870-5-104, MODBUS-TCP and DNP central server(s).
VCL-2140 is a low data rate Serial and Ethernet Data Encryption equipment with integrated firewall capabilities that may be installed
to secure and protect ethernet and RTU data (Remote Terminal Data) in critical infrastructure, Smart Grid,
Oil and Gas Infrastructure and Railway Signalling Networks. The VCL-2140 Data Encryption Equipment may be installed in point-to-point applications and used to provide to secure
communications between the RTU Terminals and their corresponding IEC -101, -104, DNP, MODBUS protocol central servers.
VCL-2243 is a high-security, high-reliability, ruggedized, failsafe transparent RTU Firewall that is designed to be installed
between the RTU and the SCADA server without having to reconfigure any element of the network. VCL-2243 firewall supports IEC 60870-5-104 (IEC 104),
IEC 61850 MMS protocol, MODBUS TCP/IP protocol options with extremely advanced features that may be installed to secure and protect RTUs (Remote Terminal
Units) in critical infrastructure.
VCL-SafeComm-E is a family of Ethernet Failover Protection Switches that provide 1+1 Automatic Ethernet Failover / AB Fallback
Protection between an "active” and "standby" equipment; or between “main” and “standby” networks which are connected to the network through an
The VCL-5001, Network Traffic Sniffer is a cyber-security element that detects firewall breaches, network
intrusions, data leaks and cyber-attacks in “real-time”. It also provides the user, the data to conduct forensic analysis and trace the attack
route which assists the user to identify the points of network vulnerability and data leaks in their network.