Centralized
Management

CyberX’s scalable architecture enables centralized visibility and control across multiple tiers in the organization, giving you a single unified view of OT risk across all their sites worldwide.

MockupIpad2131233

YOUR WINDOW TO

YOUR WORLD.

Global industrial companies are looking for a single unified view of OT risk across all their sites worldwide.

CyberX’s scalable architecture enables centralized visibility and control across multiple tiers in the organization.

CENTRALIZED VISIBILITY

At a glance, your SOC team can see which sites are most at risk due to:

  • Risk Score
  • Malicious Activity
  • Operational Failures and Equipment Malfunctions

You can also get an aggregated global view of all:

  • Assets and Network Topology
  • Connectivity and Appliance Status
  • Roles and Permissions
すべてのグローバル拠点のアセット、リスク、脅威の統合ビューを見る

すべてのグローバル拠点のアセット、リスク、脅威の統合ビューを見る

MULTI-LEVEL HIERARCHY

CyberX_Centralized_Management_Graphic_112018
Group 4149

FLEXIBLE VIEWS

View assets, vulnerabilities, and threats via:

  • Global views, across all sites
  • Site views, representing a single facility
  • Custom logical zones based on asset type, production line, physical location, etc.
  • Sensors, the lowest level, representing all assets monitored by a given appliance
Group 4150

CENTRALIZED CONTROL

Push to all appliances:

  • Policy changes
  • Configuration changes
  • Threat intelligence updates
  • Software updates
Group 4151

APPLIANCE STATUS

View status of each sensor appliance:

  • Connectivity
  • Date of last intelligence data download
  • Date of last software version download
Group 4153

ROLE-BASED ACCESS CONTROL (RBAC)

Not everyone needs access to all views and administrative functions. CyberX’s Central Manager enables users and groups to be centrally managed from a single console, with varying permission levels. Active Directory integration reduces complexity by leveraging your existing IAM infrastructure.

Group 4152

HIGH-AVAILABILITY & REDUNDANCY

An optional high-availability (HA) configuration adds a Central Manager console that periodically receives backups of all configuration files required for recovery. Sensor appliances can also be configured to perform periodic local backups of all essential data.

Primary Use Cases

Every organization is at a different stage in their OT cybersecurity maturity. Just as adversaries are becoming increasingly sophisticated, organizations are also continually challenged to up their game. CyberX enables you to easily adopt new capabilities to match your organizational readiness.

Asset Management

You can’t protect what you don’t know about. CyberX auto-discovers your OT network topology and provides detailed information about all your assets including device type, manufacturer, model, serial number, firmware revision, open ports, etc.
LEARN MORE

Risk & Vulnerability Management

CyberX provides an objective risk score for your overall OT environment along with actionable mitigation recommendations — prioritized by risk — at both the device and network layers.
LEARN MORE

Threat Detection & Response

Using five distinct, ICS-aware self-learning analytics engines, CyberX continuously monitors your OT network to detect threats such as targeted attacks, malware, and insider & trusted third-party threats.
LEARN MORE

SOC Integration

A unified IT/OT security strategy is the optimal way to manage your overall digital risk. CyberX integrates natively with your existing security stack to OT-enable your SOC with real-time visibility into OT assets, vulnerabilities, and threats.
LEARN MORE

Centralized Management

CyberX’s scalable architecture enables centralized visibility and control across multiple tiers in the organization, giving you a unified view of OT assets and risk across all your sites worldwide.
LEARN MORE

Advanced Use Cases