Wurldtech


COMPANY OVERVIEW

About Wurldtech

Contact

https://www.wurldtech.com
604 669 6674

More Info on Wurldtech

Wurldtech, a GE company, is in the business of helping customers protect critical infrastructure from cyber attack. Wurldtech works with both device manufacturers and system operators to help provide protection for critical infrastructure against the persistent and dynamic cyber threats. Customers worldwide spanning Oil & Gas, Electric Power, Medical, Nuclear, Chemical, Manufacturing, Pharmaceutical and Water Treatment markets use Wurldtech products and services to reduce the risks and costs of a cyber attack, maximize system uptime and meet compliance mandates. Our Achilles certification programs have been widely adopted by both manufacturers and operators to deliver third party benchmark testing of product and system security. Additional information can be found at www.wurldtech.com.

Products and Press Releases

Security Executives

Wurldtech launches industrial managed security services for industrial and critical infrastructure operators

April 4, 2016
Wurldtech's iMSS will provide security operations, threat intelligence and incident response services for critical infrastructure and operational technology environments
34431 OpShield 56ba46cb08356
34431 OpShield 56ba46cb08356
34431 OpShield 56ba46cb08356
34431 OpShield 56ba46cb08356
34431 OpShield 56ba46cb08356
Information Security

OpShield from Wurldtech

Feb. 9, 2016
ISC West 2016 Booth #105 (Connected Security Expo)

Articles & News

(Photo courtesy bigstockphoto.com/melis)
With football still fresh on our minds, we can draw some analogies between the game and protecting critical infrastructure which use operational technology (OT) versus information technology (IT). Understanding how this technology works in a connected environment consisting of machines, control units and sensors will provide major opportunities for physical security specialists over the coming months and years.
With football still fresh on our minds, we can draw some analogies between the game and protecting critical infrastructure which use operational technology (OT) versus information technology (IT). Understanding how this technology works in a connected environment consisting of machines, control units and sensors will provide major opportunities for physical security specialists over the coming months and years.
With football still fresh on our minds, we can draw some analogies between the game and protecting critical infrastructure which use operational technology (OT) versus information technology (IT). Understanding how this technology works in a connected environment consisting of machines, control units and sensors will provide major opportunities for physical security specialists over the coming months and years.
With football still fresh on our minds, we can draw some analogies between the game and protecting critical infrastructure which use operational technology (OT) versus information technology (IT). Understanding how this technology works in a connected environment consisting of machines, control units and sensors will provide major opportunities for physical security specialists over the coming months and years.
With football still fresh on our minds, we can draw some analogies between the game and protecting critical infrastructure which use operational technology (OT) versus information technology (IT). Understanding how this technology works in a connected environment consisting of machines, control units and sensors will provide major opportunities for physical security specialists over the coming months and years.
Security Executives

How football helps explain critical infrastructure cybersecurity

Feb. 18, 2016
This is the part of the organization where physical security and cybersecurity intersect

Request More Information

By clicking above, I acknowledge and agree to Endeavor Business Media’s Terms of Service and to Endeavor Business Media's use of my contact information to communicate with me about offerings by Endeavor, its brands, affiliates and/or third-party partners, consistent with Endeavor's Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them. You may unsubscribe at any time.