Trusted. Industrial. Cybersecurity.

CyberX combines advanced M2M behavioral analytics and anomaly detection with proprietary ICS threat intelligence — rapidly detecting both cyber and operational incidents to maximize uptime

CyberX Announces New ICS Asset Visibility & Threat Monitoring App for the Palo Alto Networks Application Framework

Visit CyberX in the Innovation Sandbox Monday, May 21 through Thursday, May 24 and see an on-stage demo by CyberX’s Chief Architect on Thursday, May 24 at 10:30am PT, during the Application Developer Lightning Round sessions

Find out more

Our Strategic Partners

         

CyberX Raises $18 Million in Series B Funding to Combat Rising Threats to IIoT and Critical Infrastructure, Bringing Total Funding to $30 Million

Founded by military cyber experts with nation-state expertise defending critical infrastructure, company demonstrates rapid growth with continuous ICS threat monitoring and risk mitigation platform

View the press release

CyberX cordially invites you to a seminar about

Emerging ICS/SCADA Threats and How to Maximize Operational Resilience

Wednesday, June 20 at 13:30
Frankfurt, Germany


Register here

GLOBAL ICS & IIOT RISK REPORT

A data-driven analysis of vulnerabilities in real-world OT networks based on analyzing 375 industrial control networks via Network Traffic Analysis (NTA), across multiple industrial sectors in the US, EMEA and APAC.

Download the report

CyberX Launches Proactive Risk Mitigation with Automated ICS Threat Modeling — First Solution to Predict Most Likely Paths of Targeted ICS Attacks

Innovative Analytics Enable OT Security Teams to Proactively Mitigate Risk For Their Most Critical OT Assets

Learn More

Continuous, real-time threat monitoring for IIoT & ICS/SCADA security and operational resilience

Continuous, non-invasive asset discovery and risk assessments to identify vulnerabilities such as unauthorized remote connections, insecure devices, weak authentication, and weak segmentation.

Complete situational awareness of malware and targeted threats such as: unauthorized PLC changes; PLC Stop commands; scanning malware indicating reconnaissance operations using ICS protocols; protocol violations indicating attempts to exploit known vulnerabilities.

Agentless technology that’s deployed in less than an hour and has zero impact on the OT network. Uses machine learning to eliminate need for rules or signatures. Supports any ICS vendor, industrial protocol & SIEM.

Many industrial organizations are now implementing modernization initiatives requiring increased connectivity between IT and OT networks. But IT/OT convergence also leads to a larger attack surface and increased cyber-risk.

Founded in 2013 by military cyber experts with nation-state expertise defending critical infrastructure, CyberX provides the most trusted and widely-deployed platform for securing IIoT and ICS networks, spanning diverse sectors including energy & utilities, pharmaceuticals, chemicals, oil & gas, manufacturing, building automation, and transportation & logistics.   Learn more

What the Industry is Saying About CyberX

“CyberX’s specialization in providing in-depth visibility and threat intelligence across different specialized industrial protocols has resulted in powerful capabilities.”1

 

Only Industrial Cyber Vendor Chosen for Innovation Award Sponsored by US DHS & DoD

 

Only Industrial Cyber Vendor Recognized by the International Society of Automation

 

Best ICS Product Winner Two Years in a Row

 

Featuring CyberX Threat Intelligence Research

Latest Blog Posts & Security Bulletins

We selected CyberX because of their innovative, best-in-class technology and world-leading expertise in industrial cybersecurity and threat intelligence. CyberX enables our customers to significantly reduce risk and strengthen their operational resilience, both today and as they implement new digitization initiatives. Our strategic partnership with CyberX enables us to offer a mature, field-proven solution that’s scalable and can be rapidly deployed.”

Dirk Backofen

Head of Telekom Security

Deutsche Telekom/T-Systems

Supported Vendors

                     

& more.   Learn How

OT networks are comprised of machines communicating with each other, which makes their behavior highly deterministic.

CyberX uses patent-pending, M2M behavioral analytics to model ICS networks as deterministic sequences of states and transitions, a technique known as Industrial Finite State Machine (IFSM). This unique machine learning technology enables the CyberX platform to immediately detect any anomalous or unauthorized activity with minimal false positives.

Combined with other analytics and proprietary ICS threat intelligence, IFSM enables rapid detection of industrial malware such as NotPetya, BlackEnergy and Havex; targeted attacks such as unauthorized program execution on PLCs; and vulnerabilities such as unauthorized remote access and device misconfigurations.

1 “Cool Vendors in Security for Technology and Service Providers, 2015”, Gartner, 23 April 2015