Cybersecurity Blog: The Cyber Scene is evolving, are you?

New features make compliance and configuration management easier than ever!

Please see links below to view our new Passive Monitoring capabilities sheet:

Overview

Industrial Control Systems / Supervisory Control and Data Acquisition (ICS/SCADA) devices monitor and control critical infrastructure, but what tools monitor these systems? Many ICS/SCADA systems were developed and deployed before the evolution of today’s cybersecurity threats. These systems were not designed to interface with modern IT security architecture. Typically they lack local intelligence or security awareness. Most ICS/SCADA systems are protected only by a firewall, leaving OT security operators with little understanding of who or what may be trying to penetrate and breach there systems. Passive monitoring helps fill this ICS visibility gap.

Passive monitoring deploys non-invasive network sensors that capture the communication between SCADA and PLC devices looking for possible threats. These devices listen to network traffic and have a learning capability that captures the typical communication between devices and report out when anomalous activity is detected.

Read more

Industrial control systems compliance owners find project success with Industrial Defender ASM

Leverage ready-to-go NERC CIP, NIST and NEI 08-09 policy libraries along with the Work Automation Suite to automate the collection, storage and  reporting of compliance artifacts for audit requirements.

Effectively meet requirements for compliance programs. As new asset configuration changes and compliance events are detected Compliance managers can use the customizable ASM 6.1 dashboards to monitor continuous compliance. Dashboards help to visualize compliance by key metrics such as deviations from asset configuration baselines, security events to be reviewed and new assets to baseline.

The ASM 6.1 dashboard tiles display real-time asset configuration changes and event monitoring such as authentication events. Charts and graphs provide a range of critical data including reachability and distribution by varying criteria, aggregation of deviations or exceptions of events across your environment, configuration baseline graphs waiting to be promoted and authentication events that track failed login attempts in your ICS environment.

Read more

Release of ASM 6.0 was a significant milestone for our team and the Industrial Defender ASM solution stack. In a little more than two years from its first release ASM has captured the mindshare of the OT market. With ASM 6.0 we’ve introduced new applications and several key improvements to existing applications. After a successful controlled introduction process we are to happy to announce the general availablity to the market.

Industrial Defender solutions will be the standard across our entire fleet." – Leading US Utility

Read more

Primary objectives of hydroelectric control systems operators include ensuring operational stability and simplifying the task of meeting federal security and compliance requirements.

What's standing in their way? We've compiled a list of 10 major concerns facing operators in assuring the operational stability of all water management assets, as well as compliance with Federal Energy Regulatory Commission and NERC standards. These challenges can be broadly grouped into three major areas:

  • Business Practices
  • Infrastructure Management
  • Policy Considerations

Read more