PLUG ’N PROTECT
Perimeter firewalls and conventional ICS/SCADA defenses — including outdated notions like “air-gapping” and “security by obscurity” — are no longer sufficient to protect OT networks. Targeted attacks, sophisticated malware, and insider and trusted third-party threats require different, more specialized protection. That’s why CyberX was purpose-built for OT defense.
Delivers immediate insights about ICS assets, vulnerabilities, and threats — in less than an hour — without relying on rules or signatures, specialized skills, or prior knowledge of the environment.
ICS-aware with deep embedded knowledge of OT protocols, devices, applications — and their behaviors.
Continuous monitoring and real-time alerting with minimal false positives.
Known and zero-day threats — CyberX detects both for complete cybersecurity.
Passive and non-intrusive — with zero impact on OT networks and devices. The CyberX appliance connects to a SPAN port or network TAP and immediately begins collecting ICS network traffic via passive (agentless) monitoring.
Holistic — reduces complexity with a single unified platform for asset management, risk and vulnerability management, and threat monitoring with incident response.
Read more about the CyberX Platform
5 DISTINCT ANALYTICS ENGINES TO DETECT ANOMALIES FASTER — WITH FEWER FALSE POSITIVES
Sophisticated attacks typically use multiple techniques to compromise OT networks, easily bypassing first-generation systems that look at baseline variations alone. That’s why CyberX identifies unusual or unauthorized behavior via five distinct
analytics engines, while self-learning eliminates the need for configuring rules or signatures, specialized skills,
or prior knowledge of the OT environment.
OT SECURITY IS NOT IT SECURITY
Unlike IT security tools, our OT-specific security platform:
- Leverages a deep understanding of industrial protocols (DNP3, ICCP, IEC104, IEC61850, OPC, etc.)
- Incorporates ICS-aware behavioral analytics and threat intelligence — for faster anomaly detection with fewer false positives
- Provides ICS-aware asset discovery and vulnerability management supporting diverse vendors (Rockwell Automation, Schneider Electric, Siemens, GE, etc.)
- Uses agentless, non-invasive technology with zero impact on your production network and is easily deployed as either a virtual or physical appliance.
Primary Use Cases
Every organization is at a different stage in their OT cybersecurity maturity. Just as adversaries are becoming increasingly sophisticated, organizations are also continually challenged to up their game. CyberX enables you to easily adopt new capabilities to match your organizational readiness.