scadafenceSCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world’s most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently.

Secur is a Platinum partner of SCADAfence offering solution sales and support, we are active in markets across Africa. We resell and integrate SCADAfence in South Africa, Botswana, Namibia, Kenya and Nigeria

The SCADAfence Platform

Continuous OT security network monitoring that provides visibility, risk management and threat detection.

Continuous Network Monitoring

Operational technology security & network connectivity has become a mandatory business requirement.
It requires a shift in the security mindset from “How can I air gap or isolate?”
to “How can I stay secure while connected?”
SCADAfence Platform is a non-intrusive continuous network monitoring solution that was purposely built to provide the required visibility and security for organizations adopting advanced Industrial IoT technologies.


The SCADAfence Governance Portal

The SCADAfence Governance Portal provides a governance solution portal that enables IT and OT departments to centrally define and monitor their organization’s adherence to OT-related regulations and security policies. The SCADAfence Governance Portal offers users the ability to define compliance enforcement policies and continuously monitor compliance enforcement status for various ICS standards, frameworks and regulations. It measures compliance progress made over time across all sites and identifies all of the gaps and bottlenecks providing continuous governance oversight using the most up-to-date technology.

The SCADAfence Governance Portal can be compared with self-reporting and sending auditing teams on-site. The SCADAfence Governance Portal has built-in, site-specific compliance reports which enable users to generate systematic strategies and improve organizational security at scale.

Fully Automated

Doesn’t require any manual labor in reporting.


This automated solution doesn’t suffer from human errors and misunderstandings.


The reports are based on real-time information coming from the remote sites. No need to wait for the next quarter or year to get results.

Get Full Compliance Between IT & OT

  • IT and OT departments can centrally define and monitor organizational adherence to policies & regulations.
  • “Translate” the technical network and security events into measurable risks and manageable action items.
  • Interface to any other network and security system to complete the compliance view.
  • Get accurate information based on real-traffic data.

IoT Device Fleet Management

  • Automatic inventory of all IoT devices, regardless of vendors and device models.
  • Detailed device information such as vendor, model, firmware versions and others.
  • Perform bulk managerial actions on devices.

AI-based Threat detection and prevention

  • Detection of known and unknown threats.
  • Micro Granular Baseline technology learns the normal operation of your IoT devices and alerts on any suspicious deviations from the baseline.
  • Predefined profiles and behavioral detection – Protection from Day #1 with post-deployment AI-based learning to optimize the profiles based on actual network data.
  • Perform automated & manual corrective actions.

Vulnerability management

  • Find vulnerabilities in your asset database, prioritize and take proactive action.
  • Limit the attack surface using built-in, automated preventive actions.
  • Detect firmware and software vulnerabilities (CVEs).
  • Detect risky misconfigurations.
  • Detect vulnerabilities at the network architecture level.

Get in Touch

+27 (0) 87-164-2205
Request a Quote