{"id":2202,"date":"2026-03-25T09:40:33","date_gmt":"2026-03-25T00:40:33","guid":{"rendered":"https:\/\/cytur.net\/solutions-shipyards\/"},"modified":"2026-04-07T23:22:52","modified_gmt":"2026-04-07T14:22:52","slug":"solutions-shipyards","status":"publish","type":"page","link":"https:\/\/cytur.net\/en\/solutions-shipyards\/","title":{"rendered":"Solutions Shipyards"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2202\" class=\"elementor elementor-2202 elementor-28\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-154ddd3 e-con-full e-flex e-con e-parent\" data-id=\"154ddd3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dca2d4 elementor-widget elementor-widget-html\" data-id=\"9dca2d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div style=\"background:#0A0E1A; overflow:visible;\">\n<style>\n.sy-fade{opacity:0;transform:translateY(40px);transition:opacity 0.8s ease,transform 0.8s ease;}\n.sy-fade.visible{opacity:1;transform:translateY(0);}\n.sy-d1{transition-delay:0.15s;}\n.sy-d2{transition-delay:0.3s;}\n.sy-d3{transition-delay:0.45s;}\n.sy-card{background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:16px;padding:36px 32px;transition:border-color 0.3s,transform 0.3s;}\n.sy-card:hover{border-color:rgba(26,86,219,0.3);transform:translateY(-4px);}\n.sy-feat{font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:2;margin:0;padding-left:18px;position:relative;}\n.sy-feat::before{content:'';position:absolute;left:0;top:11px;width:6px;height:6px;border-radius:50%;background:#1A56DB;}\n.sy-tag{display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;letter-spacing:0.5px;padding:8px 18px;border-radius:8px;margin-bottom:12px;color:#FFFFFF;background:#1A56DB;}\n.sy-badge{display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#FFFFFF;margin-bottom:16px;padding:10px 20px;border-radius:8px;}\n.sy-badge-red{background:rgba(229,62,62,0.3);border:1.5px solid rgba(229,62,62,0.5);}\n.sy-badge-blue{background:rgba(26,86,219,0.3);border:1.5px solid rgba(26,86,219,0.5);}\n.sy-ch{font-family:'Pretendard Variable',sans-serif;font-size:17px;color:#A0AEC0;line-height:1.8;padding-left:24px;position:relative;margin:0 0 14px;}\n.sy-ch::before{content:'';position:absolute;left:0;top:10px;width:8px;height:8px;border-radius:50%;background:rgba(229,62,62,0.5);}\n.sy-wf{opacity:0;transform:translateX(-30px);transition:opacity 0.6s ease,transform 0.6s ease;}\n.sy-wf.visible{opacity:1;transform:translateX(0);}\n\n@media (max-width: 767px) {\n  .sy-sol-grid { display: block !important; }\n  .sy-sol-grid > div { margin-bottom: 16px; }\n  .sy-card { padding: 24px 16px !important; }\n  .sy-feat { font-size: 14px !important; line-height: 1.65 !important; padding-left: 14px !important; }\n  .sy-feat::before { top: 9px !important; width: 5px !important; height: 5px !important; }\n  .sy-val-grid { display: block !important; }\n  .sy-val-grid > div { margin-bottom: 12px; padding: 20px 16px !important; }\n  .sy-ch { font-size: 14px !important; padding-left: 18px !important; }\n  .sy-ch::before { width: 6px !important; height: 6px !important; top: 8px !important; }\n  .sy-cta-btns a { width: auto !important; display: inline-block !important; font-size: 14px !important; padding: 12px 24px !important; }\n}\n<\/style>\n\n<!-- HERO -->\n<div style=\"position:relative;min-height:560px;display:flex;align-items:center;overflow:hidden;\">\n<div style=\"position:absolute;inset:0;\">\n<img decoding=\"async\" src=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/solution_shipyards-scaled.png\" alt=\"\" style=\"width:100%;height:100%;object-fit:cover;display:block;\">\n<div style=\"position:absolute;inset:0;background:rgba(10,14,26,0.65);\"><\/div>\n<\/div>\n<div style=\"position:relative;z-index:1;max-width:1280px;margin:0 auto;padding:120px 40px;text-align:center;\">\n<div style=\"display:inline-block;font-family:'Pretendard Variable',sans-serif;font-size:13px;font-weight:600;letter-spacing:2.5px;text-transform:uppercase;color:#FFFFFF;margin-bottom:16px;padding:6px 16px;border:1px solid rgba(255,255,255,0.4);border-radius:4px;background:rgba(255,255,255,0.15);\">Shipyard<\/div>\n<h1 style=\"font-family:'Pretendard Variable',sans-serif;font-size:48px;font-weight:700;color:#FFFFFF;margin:16px 0 20px;letter-spacing:-0.5px;line-height:1.15;text-shadow:0 2px 20px rgba(0,0,0,0.8);\">Security Embedded from Design.<br>Compliance-Ready Delivery.<\/h1>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;color:#A0AEC0;margin:0;line-height:1.6;text-shadow:0 2px 16px rgba(0,0,0,0.6);\">Meet IACS UR E26\/E27 requirements from the design stage<br>and deliver vessels with verified security.<\/p>\n<\/div>\n<\/div>\n\n<!-- CHALLENGES -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:80px 40px;\">\n<div class=\"sy-fade\" style=\"display:flex;gap:60px;align-items:center;\">\n<div style=\"flex:1;\">\n<div class=\"sy-badge sy-badge-red\">Challenges<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 28px;line-height:1.25;\">Challenges Facing Shipyards<\/h2>\n<div class=\"sy-ch\">IACS UR E26 mandates cybersecurity integration from the design stage<\/div>\n<div class=\"sy-ch\">Surging workload to verify CBS equipment security across multiple vendors<\/div>\n<div class=\"sy-ch\">Comprehensive security testing before sea trials and asset inventory maintenance post-delivery<\/div>\n<div class=\"sy-ch\" style=\"margin-bottom:0;\">Risk of vessel delivery delays due to security deficiencies<\/div>\n<\/div>\n<div class=\"sy-fade sy-d1\" style=\"flex-shrink:0;width:360px;background:rgba(229,62,62,0.06);border:1px solid rgba(229,62,62,0.2);border-radius:16px;padding:60px 40px;text-align:center;\">\n<div class=\"sy-counter\" data-target=\"40\" data-suffix=\"%\" style=\"font-family:'Pretendard Variable',sans-serif;font-size:80px;font-weight:800;color:#E53E3E;line-height:1;margin-bottom:20px;\">0%<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;line-height:1.6;\">Class approval timeline reduction<br>with CYTUR adoption<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- SOLUTIONS -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:80px 40px;\">\n<div class=\"sy-fade\" style=\"text-align:center;margin-bottom:48px;\">\n<div class=\"sy-badge sy-badge-blue\">Solution<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 0;line-height:1.15;\">Solutions CYTUR Provides<\/h2>\n<\/div>\n<div class=\"sy-sol-grid\" style=\"display:grid;grid-template-columns:repeat(2,1fr);gap:24px;\">\n\n<div class=\"sy-fade sy-card\">\n<span class=\"sy-tag\">CYTUR-TM\u2122<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Threat Modeler<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Digital security design tool for vessels<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px;\">Generates virtual network maps from design data and simulates zone-by-zone attack propagation paths to proactively identify design vulnerabilities.<\/p>\n<div class=\"sy-feat\">Zone-based network visualization & attack simulation<\/div>\n<div class=\"sy-feat\">IACS UR E26\/E27 automated risk assessment reports<\/div>\n<div class=\"sy-feat\">Incident propagation path containment strategies<\/div>\n<\/div>\n\n<div class=\"sy-fade sy-d1 sy-card\">\n<span class=\"sy-tag\">CYTUR-ASA\u2122 + SCS<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Attack Surface Analysis + Asset Management<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Equipment security verification & CBS unified management<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px;\">Analyzes per-equipment attack surfaces with AI and centrally manages the security status of all CBS assets. Establishes a vendor security verification framework.<\/p>\n<div class=\"sy-feat\">Bayesian AI threat probability prediction<\/div>\n<div class=\"sy-feat\">Unified CBS asset management \u00b7 Vendor gap analysis<\/div>\n<div class=\"sy-feat\">Automated compliance documentation \u00b7 Class reports<\/div>\n<\/div>\n\n<div class=\"sy-fade sy-d2 sy-card\">\n<span class=\"sy-tag\">CYTUR-SC\u2122<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Scanner<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Automated sea trial security verification<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px;\">Automatically scans onboard networks during sea trials to identify discrepancies between design and actual configuration, and generates class submission evidence.<\/p>\n<div class=\"sy-feat\">Automated onboard CBS asset discovery \u00b7 Change tracking<\/div>\n<div class=\"sy-feat\">Design vs. actual configuration discrepancy identification<\/div>\n<div class=\"sy-feat\">Automated class submission verification evidence<\/div>\n<\/div>\n\n<div class=\"sy-fade sy-d3 sy-card\">\n<span class=\"sy-tag\">CYTUR-TI\u2122<\/span>\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 4px;\">Threat Intelligence<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#5CB8C4;margin:0 0 16px;font-weight:500;\">Pre-check planned equipment exposure<\/p>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0 0 16px;\">Pre-screens planned equipment for CVE and dark web exposure, supporting decisions to replace or remediate at-risk components.<\/p>\n<div class=\"sy-feat\">CVE & external exposure lookup for planned equipment<\/div>\n<div class=\"sy-feat\">Dark web exposure monitoring for equipment manufacturers<\/div>\n<div class=\"sy-feat\">Security intelligence-informed equipment selection at design stage<\/div>\n<\/div>\n\n<\/div>\n<\/div>\n<\/div>\n\n<!-- WORKFLOW -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:80px 40px;\">\n<div class=\"sy-fade\" style=\"text-align:center;margin-bottom:48px;\">\n<div class=\"sy-badge sy-badge-blue\">Workflow<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 0;line-height:1.15;\">Newbuild Security Implementation Process<\/h2>\n<\/div>\n<div style=\"display:flex;justify-content:center;\">\n<div style=\"display:inline-block;position:relative;\">\n<div style=\"position:absolute;left:15px;top:16px;bottom:16px;width:2px;background:rgba(26,86,219,0.3);\"><\/div>\n\n<div class=\"sy-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">01<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Design-Phase Threat Modeling<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">TI pre-checks equipment intelligence \u2192<br>TM performs network design and attack simulation.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"sy-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">02<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Equipment Security Verification<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">ASA analyzes per-equipment attack surfaces \u2192<br>SCS performs vendor security gap analysis and unified asset management.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"sy-wf\" style=\"display:flex;align-items:flex-start;gap:28px;padding-bottom:48px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">03<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Automated Sea Trial Verification<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">SC automatically scans onboard networks.<br>Identifies design vs. actual discrepancies and initiates corrective actions.<\/p>\n<\/div>\n<\/div>\n\n<div class=\"sy-wf\" style=\"display:flex;align-items:flex-start;gap:28px;position:relative;\">\n<div style=\"flex-shrink:0;width:32px;height:32px;border-radius:50%;background:#1A56DB;display:flex;align-items:center;justify-content:center;font-family:'Pretendard Variable',sans-serif;font-size:14px;font-weight:700;color:#FFFFFF;position:relative;z-index:1;\">04<\/div>\n<div style=\"padding-top:2px;\">\n<h3 style=\"font-family:'Pretendard Variable',sans-serif;font-size:22px;font-weight:700;color:#FFFFFF;margin:0 0 8px;line-height:1.3;\">Automated Class Certification Documentation<\/h3>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:16px;color:#A0AEC0;line-height:1.75;margin:0;\">Based on SCS + SC verification results,<br>auto-generates IACS UR E26\/E27 class submission documents for delivery.<\/p>\n<\/div>\n<\/div>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- VALUE -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:80px 40px;text-align:center;\">\n<div class=\"sy-fade\">\n<div class=\"sy-badge sy-badge-blue\">Value<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 40px;line-height:1.15;\">Expected Outcomes<\/h2>\n<\/div>\n<div class=\"sy-val-grid\" style=\"display:grid;grid-template-columns:repeat(4,1fr);gap:16px;\">\n<div class=\"sy-fade\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:12px;padding:28px 20px;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:32px;margin-bottom:12px;\">\u26a1<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:700;color:#FFFFFF;margin-bottom:6px;\">40% Faster Approval<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#718096;line-height:1.6;\">Automated verification<br>and documentation<\/div>\n<\/div>\n<div class=\"sy-fade sy-d1\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:12px;padding:28px 20px;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:32px;margin-bottom:12px;\">\ud83d\udee1\ufe0f<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:700;color:#FFFFFF;margin-bottom:6px;\">Zero Delivery Delay Risk<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#718096;line-height:1.6;\">Proactive security<br>flaw elimination<\/div>\n<\/div>\n<div class=\"sy-fade sy-d2\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:12px;padding:28px 20px;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:32px;margin-bottom:12px;\">\ud83d\udd17<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:700;color:#FFFFFF;margin-bottom:6px;\">Unified Vendor Verification<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#718096;line-height:1.6;\">Centralized multi-vendor<br>management<\/div>\n<\/div>\n<div class=\"sy-fade sy-d3\" style=\"background:rgba(255,255,255,0.02);border:1px solid rgba(255,255,255,0.06);border-radius:12px;padding:28px 20px;\">\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:32px;margin-bottom:12px;\">\ud83c\udfc6<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:17px;font-weight:700;color:#FFFFFF;margin-bottom:6px;\">Secure by Design<\/div>\n<div style=\"font-family:'Pretendard Variable',sans-serif;font-size:15px;color:#718096;line-height:1.6;\">Security-embedded<br>differentiation<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<!-- CTA -->\n<div style=\"border-top:1px solid rgba(255,255,255,0.05);\">\n<div style=\"max-width:1280px;margin:0 auto;padding:80px 40px;text-align:center;\" class=\"sy-fade\">\n<div class=\"sy-badge sy-badge-blue\">Get Started<\/div>\n<h2 style=\"font-family:'Pretendard Variable',sans-serif;font-size:36px;font-weight:700;color:#FFFFFF;margin:16px 0 12px;line-height:1.15;\">Start Securing Your Newbuilds<\/h2>\n<p style=\"font-family:'Pretendard Variable',sans-serif;font-size:18px;color:#718096;margin:0 0 32px;line-height:1.6;\">See how to embed security from design through delivery.<\/p>\n<div class=\"sy-cta-btns\">\n<a href=\"https:\/\/cytur.net\/en\/book-a-demo\/\" style=\"display:inline-block;padding:14px 32px;font-family:'Pretendard Variable',sans-serif;font-size:16px;font-weight:600;color:#FFFFFF;background:#1A56DB;border:none;border-radius:8px;text-decoration:none;margin-right:12px;\">Book a Demo \u2192<\/a>\n<a href=\"https:\/\/cytur.net\/en\/contact-sales\/\" style=\"display:inline-block;padding:14px 32px;font-family:'Pretendard Variable',sans-serif;font-size:16px;font-weight:600;color:#FFFFFF;background:transparent;border:1px solid rgba(26,86,219,0.5);border-radius:8px;text-decoration:none;\">Contact Sales<\/a>\n<\/div>\n<\/div>\n<\/div>\n\n<\/div>\n\n<script>\n(function(){\nvar obs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting)e.target.classList.add('visible');});},{threshold:0.1});\ndocument.querySelectorAll('.sy-fade').forEach(function(el){obs.observe(el);});\nvar wfItems=document.querySelectorAll('.sy-wf');\nvar wfObs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting){var idx=Array.from(wfItems).indexOf(e.target);setTimeout(function(){e.target.classList.add('visible');},idx*200);}});},{threshold:0.1});\nwfItems.forEach(function(el){wfObs.observe(el);});\nvar cObs=new IntersectionObserver(function(entries){entries.forEach(function(e){if(e.isIntersecting&&!e.target.dataset.done){e.target.dataset.done='1';var t=parseInt(e.target.dataset.target);var suffix=e.target.dataset.suffix;var dur=1500,st=null;function step(ts){if(!st)st=ts;var p=Math.min((ts-st)\/dur,1);var eased=1-Math.pow(1-p,3);var cur=Math.round(eased*t);e.target.textContent=cur+suffix;if(p<1)requestAnimationFrame(step);}requestAnimationFrame(step);}});},{threshold:0.3});\ndocument.querySelectorAll('.sy-counter').forEach(function(el){cObs.observe(el);});\n})();\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Shipyard Security Embedded from Design.Compliance-Ready Delivery. Meet IACS UR E26\/E27 requirements from the design stageand deliver vessels with verified security. Challenges Challenges Facing Shipyards IACS UR E26 mandates cybersecurity integration from the design stage Surging workload to verify CBS equipment security across multiple vendors Comprehensive security testing before sea trials and asset inventory maintenance post-delivery [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2202","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Solutions Shipyards - Cyber Trust &amp; Resilience for Maritime<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cytur.net\/solutions-shipyards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solutions Shipyards - Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"og:description\" content=\"Shipyard Security Embedded from Design.Compliance-Ready Delivery. Meet IACS UR E26\/E27 requirements from the design stageand deliver vessels with verified security. Challenges Challenges Facing Shipyards IACS UR E26 mandates cybersecurity integration from the design stage Surging workload to verify CBS equipment security across multiple vendors Comprehensive security testing before sea trials and asset inventory maintenance post-delivery [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cytur.net\/solutions-shipyards\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Trust &amp; Resilience for Maritime\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T14:22:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/solution_shipyards-scaled.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cytur.net\\\/solutions-shipyards\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/solutions-shipyards\\\/\",\"name\":\"Solutions Shipyards - Cyber Trust &amp; Resilience for Maritime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/solutions-shipyards\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/solutions-shipyards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/solution_shipyards-scaled.png\",\"datePublished\":\"2026-03-25T00:40:33+00:00\",\"dateModified\":\"2026-04-07T14:22:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/solutions-shipyards\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cytur.net\\\/solutions-shipyards\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/solutions-shipyards\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/solution_shipyards-scaled.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/solution_shipyards-scaled.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cytur.net\\\/solutions-shipyards\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ud648\",\"item\":\"https:\\\/\\\/cytur.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions Shipyards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#website\",\"url\":\"https:\\\/\\\/cytur.net\\\/\",\"name\":\"CYTUR Cyber Trust & Resilience for Maritime\",\"description\":\"End-to-End Cybersecurity for the Maritime Industry \uc120\ubc15 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158 \ubc0f \ucee8\uc124\ud305 \uc804\ubb38 \uae30\uc5c5\",\"publisher\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#organization\"},\"alternateName\":\"CYTUR \uc2f8\uc774\ud130\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cytur.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#organization\",\"name\":\"CYTUR\",\"alternateName\":\"CYTUR, \uc2f8\uc774\ud130\",\"url\":\"https:\\\/\\\/cytur.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cytur.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/CYTUR_Logo.png\",\"contentUrl\":\"https:\\\/\\\/cytur.net\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/CYTUR_Logo.png\",\"width\":250,\"height\":250,\"caption\":\"CYTUR\"},\"image\":{\"@id\":\"https:\\\/\\\/cytur.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cytur\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solutions Shipyards - Cyber Trust &amp; Resilience for Maritime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cytur.net\/solutions-shipyards\/","og_locale":"en_US","og_type":"article","og_title":"Solutions Shipyards - Cyber Trust &amp; Resilience for Maritime","og_description":"Shipyard Security Embedded from Design.Compliance-Ready Delivery. Meet IACS UR E26\/E27 requirements from the design stageand deliver vessels with verified security. Challenges Challenges Facing Shipyards IACS UR E26 mandates cybersecurity integration from the design stage Surging workload to verify CBS equipment security across multiple vendors Comprehensive security testing before sea trials and asset inventory maintenance post-delivery [&hellip;]","og_url":"https:\/\/cytur.net\/solutions-shipyards\/","og_site_name":"Cyber Trust &amp; Resilience for Maritime","article_modified_time":"2026-04-07T14:22:52+00:00","og_image":[{"url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/solution_shipyards-scaled.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cytur.net\/solutions-shipyards\/","url":"https:\/\/cytur.net\/solutions-shipyards\/","name":"Solutions Shipyards - Cyber Trust &amp; Resilience for Maritime","isPartOf":{"@id":"https:\/\/cytur.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cytur.net\/solutions-shipyards\/#primaryimage"},"image":{"@id":"https:\/\/cytur.net\/solutions-shipyards\/#primaryimage"},"thumbnailUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/solution_shipyards-scaled.png","datePublished":"2026-03-25T00:40:33+00:00","dateModified":"2026-04-07T14:22:52+00:00","breadcrumb":{"@id":"https:\/\/cytur.net\/solutions-shipyards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cytur.net\/solutions-shipyards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/solutions-shipyards\/#primaryimage","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/solution_shipyards-scaled.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/solution_shipyards-scaled.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cytur.net\/solutions-shipyards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ud648","item":"https:\/\/cytur.net\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions Shipyards"}]},{"@type":"WebSite","@id":"https:\/\/cytur.net\/#website","url":"https:\/\/cytur.net\/","name":"CYTUR Cyber Trust & Resilience for Maritime","description":"End-to-End Cybersecurity for the Maritime Industry \uc120\ubc15 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc194\ub8e8\uc158 \ubc0f \ucee8\uc124\ud305 \uc804\ubb38 \uae30\uc5c5","publisher":{"@id":"https:\/\/cytur.net\/#organization"},"alternateName":"CYTUR \uc2f8\uc774\ud130","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cytur.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cytur.net\/#organization","name":"CYTUR","alternateName":"CYTUR, \uc2f8\uc774\ud130","url":"https:\/\/cytur.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cytur.net\/#\/schema\/logo\/image\/","url":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/CYTUR_Logo.png","contentUrl":"https:\/\/cytur.net\/wp-content\/uploads\/2026\/04\/CYTUR_Logo.png","width":250,"height":250,"caption":"CYTUR"},"image":{"@id":"https:\/\/cytur.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cytur"]}]}},"_links":{"self":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/comments?post=2202"}],"version-history":[{"count":4,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2202\/revisions"}],"predecessor-version":[{"id":2206,"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/pages\/2202\/revisions\/2206"}],"wp:attachment":[{"href":"https:\/\/cytur.net\/en\/wp-json\/wp\/v2\/media?parent=2202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}