Til toppen

Your partner in
OT Cyber Security

Triple-S has more than 30 years of experience in industrial control systems spanning various industries. Our deep understanding of operational technology and cybersecurity provides value to you as a customer when defining your cybersecurity strategy. With consulting services, training and protection technology provided by our experienced and certified engineers, we help our customers protect production systems from emerging cyber threats.

Why Choose Triple-S?

logo
We understand the systems, protocols, and operational priorities in industrial environments. Our solutions are based on standards and compliant with SANS, IEC 62443 and NIS2. We deliver technology and services globally. With more than 100 installations in 19 countries, we have built up solid experience and expertise within OT Cyber ​​Security.


 

Modern industrial environments are increasingly exposed to cyber threats that can disrupt operations, cause financial loss, or even impact human safety. To help industrial companies and critical infrastructure operators protect their operations, Triple-S delivers specialized cybersecurity services and products—built around the SANS 5 Critical Controls for ICS Security.

These five critical controls represent the most effective and practical steps any industrial organization can take to improve its cyber resilience. Triple-S helps you implement them in a structured, risk-based manner tailored to your OT environment.

 

We offer OT Cyber Security Services and Solutions based on the SANS 5 Critical Controls

 

 

 

 


Talk to us about OT Cyber Security
 

Knut-Erik Tovslid
Knut-Erik Tovslid
Head of Network & Cyber Security
Tom-Roger Stensberg
Tom-Roger Stensberg
ICS/OT Cyber Security Consultant
Tormod Sæther
Tormod Sæther
Senior Solution Architect Network & Cyber Security

OT Incident Response

Respond to cyber-physical threats in industrial systems.

Many organizations have incident response plans focused solely on IT. Triple-S helps bridge the gap by developing and testing incident response plans that include OT systems, ensuring rapid and coordinated response across both operational and administrative domains.
We also offer tabletop exercises and simulated incident scenarios to prepare your organization for real-world OT cyber events.

 

Our Services

Risk Assessment

The purpose of the Risk Assessment is to decide upon tolerable risk and identify current risk based on existing countermeasures. The current risk will be compared to the tolerable risk, thus identifying potential need for additional risk mitigations. The Risk Assessment serve as the basis for your cyber security requirements. Without a Risk Assessment, it is impossible to create a Defensible Architecture. The Risk Assessment also defines where to place sensors for Network Monitoring, focusing on the most critical areas and assets in the production.

Backup & Recovery Planning

Backup & Recovery planning of OT-systems can dramatically reduce risk by reducing consequence of a cyber attack. The Backup & Recovery planning service helps organizations develop processes that creates resilience against a attack such as Ransomware.

Asset Management

Identification of all critical assets and their information foundational for cybersecurity and controls downstream. The asset information is primarily gathered through passive monitoring of OT traffic but can be combined with other techniques if necessary. Data from network traffic is vital when assessing the architecture in the next control.

Threat Modelling
 

Response Planning & OT Incident Response

 

Our Solutions

OT Backup & Recovery Solutions

 

OT Asset & Vulnerability Identification


 

Read the Blog Article:

It's critical to have control over Backup and Recovery in OT

Defensible Architecture

Design layered security into every layer of your environment.

Triple-S supports the implementation of segmented and defensible OT network architectures, based on IEC 62443 principles. By separating networks into zones and conduits, we help limit the spread of threats and reduce attack surfaces—creating a more secure foundation for operations. 
This includes both design services and the deployment of industrial firewalls and network segmentation solutions tailored for production environments.

 

Our Services

OT Cyber Awareness Training

Overall introduction to OT cybersecurity and differences between IT and OT, standards and frameworks—including IEC 62443, NIST, and MITRE ATT&CK—that guide cybersecurity practices in OT environments. Key topics include identifying OT assets, conducting risk and threat assessments, detecting and protecting against attacks, implementing countermeasures, incident response in OT, and recovery. The course examines how organizations can align people, technology, and processes to develop a robust defense-in-depth strategy.

Read more about our Awareness Training

Defensible Architecture Design

The purpose of the Defensible Architecture Design is to close any gaps identified in the Architecture & Configuration Assessment, thereby protecting against threats identified in the Risk Assessment. The Defensible Architecture will enable us to defend against those threats through improved network visibility and monitoring implemented in the next control.

Architecture & Configuration Assessment

The purpose of the Architecture & Configuration Assessment is to determine whether the current architecture supports the SANS 5 Critical Controls for ICS Cybersecurity. The assessment will evaluate if the current architecture effectively protects against relevant threats, and whether it enables us to defend against those threats.

OT/ICS Hardening

Our Solutions

OT Firewalls & OT Switches

 

 

Read the Blog and download the Guide:

5 Critical Controls for world class OT Cyber Security

Network Visibility & Monitoring

Gain insight into all traffic across your network.

You can’t protect what you can’t see! Triple-S provides passive OT network monitoring solutions that allow organizations to detect anomalies, unauthorized traffic, or early signs of compromise—without disrupting production.
This is key to early threat detection and ensures that any incident response efforts can be initiated quickly and based on real-time insights.

 

Our Services

Installation & Maintenance

Installing the software components according to an agreed design is important to get the full value out of the solution. After installing the software components with basic configurations, the solution will be ready for more site‑specific configurations. Patching and updates will be handled on a regular basis, according to the availability of new releases.

Threat Detection Configuration

The purpose of the Threat Detection Configuration is making sure that the Network Intrusion Detection System (IDS) is able to detect the threats  identified as relevant to the organization. The IDS will alert on policy violations, detection of relevant adeverary techniques- and tactics and indicators of compromise. 

ICS Threat Hunting
 

Colletion Management Framework Design

Our Solutions

OT Network Intrusion Detection

Secure Remote Access

Control and protect remote connections to sensitive systems.

Uncontrolled remote access is a major risk in industrial environments. Triple-S offers secure, centralized remote access solutions that put the plant owner in control—enforcing policy, access restrictions, and full audit logging.

We help ensure that all third-party access—from OEMs to system integrators—goes through a secured, monitored gateway aligned with both NIS2 and IEC 62443-3-3 Security Level 2 requirements.

 

Our Services

Secure Remote Access Design
 

Installation & Maintenance
 

Secure Remote Access Configuration

Implement and configure solution for Secure Remote Access to OT environment. Implementation of role-based access and control based on company policies and industry compliance requirements. Integration with identity providers and AD.

Our Solutions

OT Secure Remote Access - Standalone machines


 

OT Secure Remote Access - Enterprise / Site

Risk-Based Vulnerability Management

Prioritize and address the most impactful vulnerabilities.

Many industrial environments run legacy systems that cannot be patched easily. Triple-S provides a risk-based approach to vulnerability management in OT, helping prioritize actions based on business impact, exposure, and system criticality.
This includes asset discovery, vulnerability assessments, and advisory services for patching, compensating controls, or network isolation.

 

Our Services

Risk-Based Vulnarability Management

Patch Management in OT is  very different from IT. Every vulnerability must be evaluated for impact to operations and business needs. Prioritization and planning are key elements of the patch management process. Vulnerabilities are dynamic, thus requiring regular review. Questions that must be asked as a part of the process are: What impact can the vulnerability have if exploited? What is its exposure? What are the potential risks continuing operations? How difficult is it to patch? Are the operational needs greater than the risk? 

Our Solutions

OT Vulnarability Management

Maturity Assessment

A clear and actionable view of your current security posture

Our ICS Cybersecurity Maturity Assessment leverages the SANS 5 Critical Controls for ICS to provide a clear, actionable view of your current security posture. We assess your readiness across the following dimensions: ICS-Specific Incident Response Plan, Defensible Architecture, ICS Visibility and Monitoring, Secure Remote Access to OT and Risk-Based Vulnerability Management. This ensures a comprehensive review of core OT security practices and helps you chart a prioritized path to bolster ICS security while maintaining operational integrity.

 

 


From our Blog
 

logo


Sikker fjerntilgang til OT-miljø: Dette må du huske på

Et konstant økende trusselbilde gjør at sikker fjerntilgang til industrielle miljøer er viktigere enn noensinne. Har du ikke allerede tatt tak i det, er det på tide å gjøre det nå. Fjerntilgang kan spare både tid og penger, men det er viktig å gjøre noen grundige overveiinger når løsning skal velges.

Les mer
logo


Forbered bedriften på cyberangrep: Slik lager du en responsplan

Med stadig flere og mer avanserte digitale trusler er det avgjørende at bedrifter er forberedt på angrep. Det viktigste å ha på plass er en god responsplan. For mange organisasjoner er slike planer allerede godt utviklet for IT-systemene, men ofte mangler det for produksjonsmiljøet (OT-systemene).

Les mer


Digitalsikkerhetsloven: På tide å ta ansvar for cybersikkerhet

Den nye digitalsikkerhetsloven er nå ute på høring. Loven pålegger samfunnskritiske aktører å ta større ansvar for cybersikkerhet og være bedre rustet mot cyberangrep. Noen vil kanskje si at de burde tatt dette ansvaret for lenge siden. Nå tvinges de til det, og det gjenstår å se om dette faktisk vil gi de ønskede resultatene eller om det bare vil føre til en overfladisk etterlevelse av kravene.

Les mer