Cybersecurity for ICS/SCADA

Industrial Threat Detection system is server-based software that analyzes OT network‘s traffic (via mirrored stream) to generate and display a network topology model, which serves as a baseline for detecting exceptions on the network.

SCADA

ICS

Cyber Security Solutions

Includes 6 detection engines, each for a distinct threat vector or operational aspect:

Critical Infrastructures: IEC 62443, OT Cybersecurity, Optical sensing, Scada anomaly detection, Last-mile connection

Network visibility (ASSET Inventory management)

Critical Infrastructures: IEC 62443, OT Cybersecurity, Optical sensing, Scada anomaly detection, Last-mile connection

Maintenance
Management

Critical Infrastructures: IEC 62443, OT Cybersecurity, Optical sensing, Scada anomaly detection, Last-mile connection

Cyber Attack
Detection

Critical Infrastructures: IEC 62443, OT Cybersecurity, Optical sensing, Scada anomaly detection, Last-mile connection

Policy monitoring and Enforcement

Critical Infrastructures: IEC 62443, OT Cybersecurity, Optical sensing, Scada anomaly detection, Last-mile connection

Anomaly
Detection

Critical Infrastructures: IEC 62443, OT Cybersecurity, Optical sensing, Scada anomaly detection, Last-mile connection

Operational behaviour Measuring

Seamless Intergration

into your SCADA Operational Center and Security Center (SIEM-Security information and event management)

Auto-learning

Generation of baseline topology and behavior model, including all devices, ports and connections

Non-intrusive analysis

DPI protocol-based analysis of a mirrored network traffic stream, with no disruption of operations

Central or local

Central-location deployment or local deployment at remote site

PLC monitoring

Continuous supervision of configuration changes in PLCs and other networked devices

Attack vector analysis

Detection of down-vector vulnerabilities caused by networked device interoperability

MSSP-ready

Central management of multiple instances at MSSP’s SOC

Assess

Network asset mapping and vulnerability analysis

Protect

Industrial deep-packet inspection

Detect

Detection of malware, policy violations & behavioral anomalies

Monitor

Continuous monitoring service by OT-MSSP experts

Applicable for

Get in touch.

We will get back to you within 24 hours.

By continuing to browse the site, you agree to our use of cookies.