Continuous Risk Monitoring for IIOT & ICS/SCADA Networks

CyberX combines patented M2M behavioral analytics with proprietary ICS threat intelligence, enabling you to immediately detect and mitigate risk in your Operational Technology (OT) network.

Complete awareness of industrial malware, targeted threats, and vulnerabilities that can lead to operational disruption and
theft of corporate IP

Continuous, non-invasive vulnerability assessments for OT vulnerabilities such as unauthorized remote connections and unpatched or unknown devices

Deployed in less than an hour — with zero configuration required (thanks to ICS-specific machine learning). Supports any ICS vendor, industrial protocol & SIEM. Provides REST APIs

Many industrial organizations are now implementing modernization initiatives requiring increased connectivity between IT and OT networks. But IT/OT convergence also leads to a larger attack surface and increased cyber-risk.

Founded in 2013 by IDF cyber experts, CyberX provides the most trusted and widely-deployed platform for securing IIoT and industrial networks, spanning diverse sectors including energy, manufacturing, utilities, water, oil & gas, chemicals, pharmaceuticals and transportation.   Learn more

What the Industry is Saying About CyberX

Only Industrial Cyber Vendor Chosen for Innovation Award Sponsored by US DHS & DoD

Only Industrial Cyber Vendor Recognized by the International Society of Automation

Best ICS Product Winner Two Years in a Row

Featuring CyberX Threat Intelligence Research

How We’re Different

Latest Blog Posts & Security Bulletins

Supported Vendors

                     

& more.   Learn How

OT networks are comprised of machines communicating with each other, which makes their behavior highly deterministic.

CyberX uses patent-pending, M2M behavioral analytics to model ICS networks as deterministic sequences of states and transitions, a technique known as Industrial Finite State Modeling (IFSM). This unique machine learning technology enables XSense to immediately detect any anomalous or unauthorized activity with minimal false positives.

Combined with other analytics and proprietary ICS threat intelligence, IFSM enables rapid detection of industrial malware such as BlackEnergy and Havex; targeted attacks such as unauthorized program execution on PLCs; and vulnerabilities such as unauthorized remote access and device misconfigurations.