A trusted partner to our Defense and National security customers, we leverage innovative technologies, deep domain knowledge, and advanced engineering and technical expertise to deliver agile solutions matched to the mission. Whether improving speed to capability, redefining readiness, modernizing IT infrastructure, or integrating and securing digital assets, FusionICS delivers.

SERVICES

Industrial Systems Integration

The fusion of several independent control systems into an efficient and effective HMI, not only reduces distractions and confusion for the operator, it increase their effectiveness and efficiency.

Identify

Industrial Controls Systems are unique. They were designed and built for durability, with the ability to run continuously for years and years. In many cases, we find that these systems have never been patched, updated or maintained since they were installed. In some industries you are likely to find outdated and unsupported operating systems. These are some of the easy to find vulnerabilities. But what about the automation equipment itself? These end-point devices can be as small as a thermostat and run mission critical equipment. We believe that you should know if these devices hit End-Of-Life before they cause a critical equipment outage.

With infrastructures spread out across the city, and in some instances across state lines, it is difficult for asset owners to know what equipment is actually connected to their ICS system and due to the age of most ICS systems, a simple network scan performed by IT professionals can shut down equipment and lead to a loss of control or a gap in operations.

Fusion can help you find, inventory and even life-cycle those end of life components.

Detect

If you know how an adversary will approach an attack you will be better prepared to defend that environment.

Assurance – Are we actually doing what we said we should do? i.e. following the Units ICS Policies…

​Control the flow of traffic through the control network via communication protocol and Control Systems Firewalls

“all trust is limited” should be our mindset. Just because we trusted a contractor to install the system, doesn’t mean he wont act with malice on his/her next maintenance visit.

Insider threat is the highest threat we face. We need to assume the attacker is at least as intelligent as us. How do we defend against someone that we have trained?

​“A perfect set of policies and procedures are useless without employee training and awareness” ICS-CERT

Threats

  • Amateur computer attacks
  • ​Traditional Nation state actors
  • ​Angry or Unethical employee, contractor, or consultant
  • ​Sub-contractor malice during maintenance
  • ​Unintended side effects on software/firmware updates
  • Uninformed/unintended operator commands

Service B

FusionICS, LLC (“Fusion”) is a professional services firm serving the comprehensive technology needs of Advanced Automated (Smart) Facilities.

 

Fusion offers its clients unique industrial control systems (ICS) expertise with a core staff of professionals, experienced in both Information Technology and Facility Operations.

 

In addition to ICS, Fusion provides expert solutions in the following disciplines:

  • Networking
  • Automation
  • Cyber-Security
  • Facility Operators

The technical evolution and interconnection between sectors, has created dependencies, between systems, to the point where a failure in one system leads to a failure in all systems.

 

While Maintenance on facilities equipment is important, and, in most cases vital to Mission Accomplishment, a Facilities Maintenance Team, lacks the requisite skills to back-up servers, switches or automation controllers.

 

An IT firm can handle switch and server maintenance but they do not grasp the importance of maintaining a critical piece of equipment availability.

 

Our Team members are all Global Industrial Cyber Security Professional (GICSP) certified by the SANS institute and have all been trained by the Department of Homeland Security Industrial Cyber Security – Cyber Emergency Response Team (ICS-CERT).

Protect

Harden Host sites to minimize attack surface

Attackers will leverage the lack of corporate security policies, asset inventories and standardization that exits in the ICS Networks.

Cyber-to-Physical operations –  keeping the operational environment safe, secure and resilient against and current and emerging cyber threats

Security is a continuous process, not a reachable goal.

Unit ICS Policies – are they in existence? Are they being followed?

 

 

Respond

Alerting

 

Incident Response skills in a control system environment

 

Respond to security violations by notifying the proper authority, reporting needed forensic evidence of the violation, and automatically taking timely corrective action in mission critical or safety critical situations.

Recover

CASE
STUDIES

Case Study A

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Case Study A

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

TESTEMONIALS

Dept. Of Navy

The fusion of several independent control systems into an efficient and effective HMI, not only reduces distractions and confusion for the operator, it increase their effectiveness and efficiency.

Department OF

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.