First Watch Singapore Pte Ltd
Company UEN Number
202334027C
Company Website
Geographical Markets Served
Australia, Croatia, India, New Zealand, Singapore
Industry Served
Energy & Chemical
Food Manufacturing
Manufacturing
Utilities
Solution Categorisation
Detect-Anomalies and Events
Detect-Detection Processes
Detect-Security & Continuous Monitoring
Identify-Asset Management
Protect-Access Control
Company Description
Founded as a partnership between the University of Waikato and Combined Technologies (CTEK) Automation Engineering Ltd in 2019, First Watch has developed the first cybersecurity platform to prevent attacks on the OT network.
Our solutions including a patent protected software platform and professional support services provide protection to industrial and key infrastructure sectors
Combining our expertise with a range of innovative partners, we work together to successfully deliver leading cybersecurity solutions and services to our customers. Our expert team is committed to helping your organization manage cyber risk, giving you the support and tools to succeed.
Product Description
The First Watch Platform
Protects the Human Machine Interface workstations (HMI) and Programmable Logic Controllers (PLC) at the core of OT networks by controlling who has access, what applications can be used, and by preventing unauthorized actions and applications from being installed.
First Watch offers greater awareness and visibility of both hardware and software inventory on your network, designed to help you easily manage assets. Active hardware management allows your team to validate and verify asset communication pathways and hardware assets connected to the network. It also detects and alerts against any new devices connecting to the network. Visibility and monitoring of software for cyber vulnerabilities enables upgrades to be planned and prioritized minimizing your risk of cyber breaches.
The platform also provides active protection to the core assets of your OT network – the HMI and PLC. It prevents illicit access to the network, working deep in the operating system to lockdown the HMI through enforcement of policies and filtering all traffic destined for the PLC, ensuring that only trusted traffic from authenticated HMI’s delivers data to the PLC.