top of page
Maintaining The
Essential Stream of Life
Maintaining The
Essential Stream of Life
Maintaining The
Essential Stream of Life
Chain of Supply Services
SCADASUDO's team are a certified supply chain auditor accredited by the INCD.
SCADASUDO representative is a board member on the auditing committee of the Israeli standards institution for INCD chain of supply.
INCD Chain of supply compliance
Preparation and submittals for INCD chain of supply.
Full guidance of customers for achieving INCD chain of supply compliance.
Preparation of policy and procedures.
Assistance with design and implementation of cyber solutions to meet INCD requirements.
Professional Lab inspection services
Concealed malware inspection down do embedded level.​
Sterilization of electronic components.​
Deep analysis and vulnerability testing for OT/IOT devices.
(including Firmware and Binary code analysis).
INCD chain of supply categories:
Scadasudo is certified as a "Cyber Compatibility Checker for Organizational Supply Chain" of the Israeli standards institution and the cyber authority,
and is a member of the supreme certification committee.
We have successfully certified a variety of companies in various sectors of the Israeli industry (and to date, has certified the largest number of companies in Israel) for the INCD (Israel National Cyber Directorate) cyber security supply chain standard
An international high-tech company with a wide range of defense, homeland security and commercial programs
A cyber security company which provides ICS/SCADA cyber security solutions for critical infrastructures, enabling safe IT/OT integration
A company creating technological solutions in the fields of public transportation, information accessibility for the disabled and more.
Israel's leading developer of software-as-a-service (SaaS) solutions, for human resources management in the organization
A subsidiary of Ludan tech that creates sophisticated ticketing solutions for public transportation and parking management systems
Peripheral Protection
​
Protecting data at rest
Protecting Data in transit
End-points and servers
Policies & Procedures
​
Security governance
​
Data leak prevention
​
Human resources
​
Events managment
​
​Supervision & Monitoring
​
​Cyber security for cloud services
​
​Secure Development
Physical security
Access Control
Backups & Restores
Remote Access
bottom of page