Purpose-built security assessment for building automation systems. Designed for the integrators and operators who manage them.
Commercial buildings run on BAS environments like Niagara and BACnet — controlling HVAC, lighting, access, and fire safety. These systems are increasingly networked, but security assessment tools don't exist for the people who manage them.
Cybersecurity tools exist — but they're built for security professionals, not building operators. Integrators are the ones asked "is this building secure?" but they have nothing to answer with.
Nessus, Qualys, Burp Suite — built for security teams. Output requires a security professional to interpret. Integrators won't run them.
Tridium's Niagara Security Dashboard only covers Niagara devices. Doesn't assess the broader BAS environment or other protocol stacks.
Optigo's Visual BACnet does BACnet diagnostics for network health and troubleshooting — not security configs, vulnerabilities, or exposure.
Lightweight, vendor-neutral, and purpose-built for integrators. Discover, assess, and report on the security posture of building automation environments — across Niagara, BACnet, and the full control stack.
BACnet/IP enumeration, Niagara Fox protocol detection, device fingerprinting, and network topology mapping across the full BAS environment.
Insecure configuration checks, default credential detection, protocol-specific risk analysis, and CVE correlation against known BAS advisories.
Clear, actionable findings reports designed for operators — not 200-page Nessus dumps. Prioritized by real-world exploitability and impact.
Lightweight agent or
portable scan appliance
on the BAS network
Auto-enumerate BACnet
devices, Niagara controllers,
and exposed services
Run security checks:
configs, credentials,
CVEs, exposure mapping
Generate operator-readable
findings with prioritized
remediation steps
One integrator manages dozens of buildings. A single deployment scales across their entire portfolio — making every customer relationship a multiplier.
| Capability | Nozomi Networks | Tridium Niagara | Optigo (Visual BACnet) | ShadeSec |
|---|---|---|---|---|
| BACnet device discovery | ● | — | ● | ● |
| Niagara assessment | ● | ● | — | ● |
| Security-focused checks | ● | Partial | — | ● |
| Vendor-neutral | ● | — | BACnet only | ● |
| Built for integrators | — | — | ● | ● |
| Lightweight deployment | — | Built-in | ● | ● |
| CVE correlation | ● | — | — | ● |
| Operator-readable output | — | ● | ● | ● |
BAS systems integrators and commissioning firms managing Niagara and BACnet environments across multiple client sites. One integrator touches dozens of buildings — a single customer gives our tool portfolio-wide reach.
Start with 1–2 integrator design partners. Expand through direct outreach in Ontario, then partner with smart-building consultants and OT-focused MSSPs.
We've been through the build-test-iterate cycle with Control+S. We know how to ship tooling that people actually use. This roadmap gets us from prototype to real-world validation.
Management consulting firm focused on scaling small businesses. ShadeSec's founder serves as Partner and Head of Technology & Information Security — providing access to go-to-market support, client networks, and connections in California's tech ecosystem.
ShadeSec's GRC tool is in active pilot with real customer feedback driving iteration. Demonstrates ability to build, ship, and iterate on security tooling. Clients include government, non-profits, and engineering firms across Quebec, Ontario, and the Bay Area.
Practical cybersecurity tools built close to the actual need. We focus on automation and abstraction so practitioners have the best tools to accomplish their security goals.