CyberX auto-discovers all your OT assets and displays a constantly up-to-date network topology diagram showing how all devices are connected.
THE FIRST STEP IN DEFENSE.
You can’t protect what you don’t know about. With the proliferation of intelligent devices and networks, it’s simply not possible to effectively manage your OT environment, let alone protect it, without this visibility.
CyberX builds a network topology diagram, using the Purdue Model, showing how all devices are connected to each other as well as any connections to IT networks. Devices can be highlighted on the map (or filtered) based on tags including protocols used, polling intervals, standard ports, and subnets.
CyberX auto-discovers all your OT assets and maintains a constantly up-to-date inventory of them showing device type, manufacturer, open ports, serial number, firmware revision, IP/MAC address, and more.
To deliver instant snapshots of detailed asset information, CyberX supplements passive monitoring with an optional Active component that uses safe, vendor-approved commands to query both Windows and controller devices for asset details — as often or as infrequently as desired.
Primary Use Cases
Every organization is at a different stage in their OT cybersecurity maturity. Just as adversaries are becoming increasingly sophisticated, organizations are also continually challenged to up their game. CyberX enables you to easily adopt new capabilities to match your organizational readiness.