SAM helps maritime organizations

A ship can no longer do without IT. Avoid loss of productivity.

International Maritime Bureau: protect yourself!

According to the IMB, shipping is still far too lax in combating cybercrime, while the sector can easily be the victim of hackers. Since it became known last year that hackers have been able to control the port of Antwerp for a long time, according to the IMB, little has happened by the shipping sector to prevent cybercrime. The IMB, therefore, calls on shipping to protect itself against hackers.

Proven effective

SAM runs on ships to monitor all traffic between the vessel and the shore for malicious behaviour. The last thing you want is for the systems on the boat to become infected with ransomware. With the SAM-1 a small robust solution is available that can be placed in any ship and offers direct security.

From the news:

"Research by 350 industry executives shows: The transport industry expects that cyber crime and data breaches will pose a major risk in the coming ten years."

"Maritime companies are attractive to cyber criminals. They are often easier to hack than financial or government institutions. For example, a cyber attack blocked the computer system of the APM Terminals in Rotterdam and parent company A.P. Møller-Maersk at the end of June 2017, causing container handling to stop."

"Maritime Strategy: sector focuses on sustainability, innovation and cybersecurity"

SAM is available as a mini-appliance and rack-mount variant

Because SAM is offered both as a mini-appliance and as a large (virtual) server, there is a suitable solution for every situation. Contact us to discuss the options.

Dutch Government Cybersecurity 2020:

"Quick detection can limit consequences, but in general it takes a long time. Detecting attacks early is a basic measure. The sooner the better. However, that remains a complex task for many organizations."

"According to a study, the average detection time of an attack in 2019 was 56 days. This average detection time is disproportionate to the speed with which an attacker can reach his target. It only takes a few hours. The annual report states that actors are quick to abuse. of published vulnerabilities. Even when the attacker is looking for less success, for example for espionage, rapid detection can limit the damage."

Increase your resilience immediately!

SAM Cyber Alarm

This website uses two types of cookies: for the correct design and use of anonymized visitor statistics via Google Analytics. More information can be found in our Privacy Policy.