Veracity Cerebellum

Problems that solves

No IT security guidelines

Risk or Leaks of confidential information

Insufficient risk management


Ensure Security and Business Continuity

Manage Risks

Veracity Cerebellum

Veracity Cerebellum is designed for operational and engineering efficiency; a logical workflow-based approach to network configuration, orchestration, security and resilience.


In the human brain, the cerebellum receives information from the sensory systems, the spinal cord, and other parts of the brain and then regulates motor movements. The cerebellum coordinates voluntary movements, resulting in smooth and balanced muscular activity. It is also important for learning motor behaviors. The Veracity “Cerebellum” platform is designed to serve a similar function for industrial networks.
Veracity’s Cerebellum provides a system level approach that responds to sensory data and orchestrates the pre-designed production process response.
Cerebellum is designed for operational and engineering efficiency; a logical workflow-based approach to network configuration, orchestration, security and resilience.
What Does Veracity Cerebellum Offer:
Security Level Model
  • Cerebellum provides the first fully functional visual based security level model builder.
  • The security level allows for a user to quickly build the Purdue Manufacturing Model, ISA-95, ISA-99, or even create a model from scratch.
  • The user can quickly define the functional levels in their model and drag & drop device types from the industry library to their respective functional levels.
  • Finally, the user can easily define rules for each level (e.g. communication between levels)
  Authorize Networked Devices
  • Cerebellum makes device management simple.
  • With Veracity’s INDUSTRIAL SDN™, 100% of all devices connected to the network are identified.
  • During the learning/identification mode, the system is also characterizing the network devices to classify the functional role and device type (e.g., PLC, RTU, SCADA Server, etc.).
  • Device management provides information to the user to define whether a device should be authorized or not.
  • The user can also decide to quarantine a device (e.g., an unauthorized integrator laptop).

Security Zone Management
  • Cerebellum provides an innovative approach to network segmentation via the creation of security zones.
  • This workflow-based approach allows the user to easily create security zones or logical groups and assign devices to those groups.
  • This can be accomplished in multiple ways from Cerebellum’s single pane of glass – by asset/network drag and drop or command line interface.
Authorized Communication
  • Cerebellum provides an innovative approach to traffic engineering which the abstracts complexity at scale while allowing fine-grained control.
  • The user can manage traffic at a high level – e.g. what zone to zone communications are permitted – or via very granular rules such as “a specific PLC is allowed to communicate with a specific HMI over DNP-3.”
  Visual Validation
  • Where engineers are very comfortable working with spreadsheet-like interfaces for managing complex data, what is lacking is a visual representation.
  • Visual validation is an important step to identify the rules that are being configured in a simplified and consumable manner.
  • This enables the user to maximize their efficiency and accuracy.
  System Policy Management
  • In addition to simplified traffic engineering via zones and device types, Cerebellum provides dynamic, API-based control by allowing configuration change sets to be grouped as policies.
  • These policies can be enabled or disabled at any time, vastly simplifying operational workflows.
  • For instance, during normal operation it may not be required to allow engineering workstations network access to control (e.g., PLCs) devices.
  • The system will support both a default policy of denying that access alongside an operational policy of allowing that access, and switching between them can be done via a remote but authorized process driven by a change management workflow or via a few clicks in the user interface.

Scheme of work

 Scheme of work

User features

Roles of Interested Employees

IT Security and Risk Management

Chief IT Security Officer

Chief Information Officer

Organizational Features

IT Security Department in company

Сonfidential data

GDPR Compliance