Our
Services
THE HUMAN FACTOR
As a mature technology company, CyberX has developed a suite of customized services designed to support and extend your ability to effectively protect your IoT and ICS environments.
Executing joint operations with global service providers, our goal is to empower your current Tier 1 SOC analysts to handle the majority of IoT and ICS incidents without escalation, and to minimize alert noise from your IoT and ICS environment.
CYBERX’S SUITE OF EXPERT ICS SECURITY SERVICES
SOC ENABLEMENT SERVICES
We’ll help enable your SOC team via in-depth workshops introducing them to IoT/ICS protocols, devices, use cases, and workflows. We’ll also customize your current SOC workflows to support the unique characteristics of IoT/ICS, and develop custom integrations with your existing IT security stack (SIEMs, ticketing systems, firewalls, secure remote access, etc.).
INCIDENT RESPONSE & FORENSIC SERVICES
CyberX experts are also available to supplement your team or service provider with critical IoT/ICS incident response activities:
- Case and scope analysis
- Data acquisition and preservation
- Network- and host-layer forensics
- Malware analysis
- Remediation and clean-up
- Comprehensive IR report with recommendations
We also offer incident response and response readiness assessments to test and improve your team’s IR process.
SUPPORT SERVICES
CyberX customers receive standard expert support, including technical support, software & threat intelligence updates, online help & case management, and hardware repair/replacement under warranty. We also offer premium support options, including a dedicated customer success manager, priority routing of issues & enhancement requests, ongoing health checks, and membership in our Customer Advisory Board.
TRAINING & CUSTOMIZED WORKSHOPS
We offer organizational alignment workshops to align OT and IT teams and set you up for a successful deployment. We also offer onsite or remote workshops on a range of topics, such as in-depth CyberX product training and best practices, and education on the differences between IT and IoT/ICS so your team can leverage their existing skills.
ON-BOARDING SERVICES
CyberX experts set your team up for success with a range of onboarding and planning services. Onboarding services are either on-site or remote, and include a dedicated project manager who works closely with your own project manager on rollout activities. We also offer network architecture planning, which includes a thorough review of your IoT/OT network architecture to identify ideal locations for centrally-managed CyberX sensors.
Read the solution brief describing our service offerings
SOMETIMES, YOU JUST HAVE TO GO ‘MANO A MANO’
CyberX’s services team is composed of world-class domain experts who were in the trenches at a national CERT defending against daily nation-state cyberattacks. The team has already submitted more than a dozen zero-day vulnerabilities to the US ICS-CERT, including previously unknown vulnerabilities for devices manufactured by Rockwell Automation, Schneider-Electric, GE, Siemens, Emerson Automation, CODESYS, AVEVA, and others.
Our team is available to personally help your existing SOC team integrate IoT and ICS visibility and alerts into your existing policies, workflows, and security stack.
What’s more, the team has developed specialized tools for reverse-engineering industrial malware. You can read the team’s analysis of the TRITON malware here, which includes a never-before-published description of the custom protocol developed by the attackers to communicate with their backdoor in the safety PLC.
We can also help your SOC staff and IoT and ICS control engineers efficiently communicate and collaborate with each other using a common language and objectives — accelerating the removal of IT/OT silos that have traditionally existed in many organizations.
By building upon the significant investments you’ve already made in SOC personnel, processes, and technology, we enable you to confidently assume responsibility for both IoT and ICS and IT security — thereby supporting a single enterprise-wide risk view across both IT and IoT and ICS domains.