Our
Services

THE HUMAN FACTOR

As a mature technology company, CyberX has developed a suite of customized services designed to support and extend your ability to effectively protect your IoT and ICS environments.

Executing joint operations with global service providers, our goal is to empower your current Tier 1 SOC analysts to handle the majority of IoT and ICS incidents without escalation, and to minimize alert noise from your IoT and ICS environment.

 CYBERX’S SUITE OF EXPERT ICS SECURITY SERVICES

icon-workflows

OT-ENABLEMENT SERVICES

We’ll help your SOC team modify their existing integrations, runbooks, and simulations to address the unique characteristics of IoT and ICS. In fact, we’ll also help you test the entire end-to-end process — by the end of the first day — with simulated traffic to ensure everything’s working correctly.

icon-onsite

ONSITE OT INCIDENT RESPONSE

CyberX experts are also available to supplement your team or service provider with critical IoT and ICS incident response activities:

  • Case and scope analysis
  • Data acquisition and preservation
  • Network- and host-layer forensics
  • Malware analysis
  • Remediation and clean-up
  • Comprehensive IR report with recommendations
icon-automated-ics

AUTOMATED ICS MALWARE ANALYSIS

Unique in the industry, CyberX offers a cloud-based sandbox service for automated ICS malware analysis. With a single click, you can upload suspicious files and immediately determine if and how the malware targets IoT and ICS assets, along with a list of IOCs. This unique approach enables your SOC team to easily embed ICS-specific malware analysis into their existing IR workflows — even for ICS malware that has never been seen before.

icon-workshops

SUPPORT SERVICES

We’ll help you be successful with a suite of support services including 24×7 support, on-boarding and deployment planning, project management, dedicated Technical Account Managers (TAMs), and ongoing health checks, plus standard services including online ticketing and help, hardware replacement, and more.

icon-integrations

TRAINING &
CUSTOMIZED WORKSHOPS

During our educational workshops, our IoT and ICS security experts will describe the similarities and differences between IT and IoT and ICS so your SOC and IoT and ICS personnel can leverage their existing training and skills – and we’ll tailor out course modules for the optimal learning experience for your team. We also offer standard product training via self-placed e-learning as well as via onsite instructor-led courses.

Read the solution brief describing our service offerings

SOMETIMES, YOU JUST HAVE TO GO ‘MANO A MANO’

CyberX’s services team is composed of world-class domain experts who were in the trenches at a national CERT defending against daily nation-state cyberattacks. The team has already submitted more than a dozen zero-day vulnerabilities to the US ICS-CERT, including previously unknown vulnerabilities for devices manufactured by Rockwell Automation, Schneider-Electric, GE, Siemens, Emerson Automation, CODESYS, AVEVA, and others.

Our team is available to personally help your existing SOC team integrate IoT and ICS visibility and alerts into your existing policies, workflows, and security stack.

What’s more, the team has developed specialized tools for reverse-engineering industrial malware. You can read the team’s analysis of the TRITON malware here, which includes a never-before-published description of the custom protocol developed by the attackers to communicate with their backdoor in the safety PLC.

We can also help your SOC staff and IoT and ICS control engineers efficiently communicate and collaborate with each other using a common language and objectives — accelerating the removal of IT/OT silos that have traditionally existed in many organizations.

By building upon the significant investments you’ve already made in SOC personnel, processes, and technology, we enable you to confidently assume responsibility for both IoT and ICS and IT security — thereby supporting a single enterprise-wide risk view across both IT and IoT and ICS domains.

Primary Use Cases

Every organization is at a different stage in their IoT & ICS cybersecurity maturity. Just as adversaries are becoming increasingly sophisticated, organizations are also continually challenged to up their game. CyberX enables you to easily adopt new capabilities to match your organizational readiness.

Asset Management

You can’t protect what you don’t know about. CyberX auto-discovers your IoT and ICS network topology and provides detailed information about all your assets including device type, manufacturer, model, serial number, firmware revision, open ports, etc.
LEARN MORE

Risk & Vulnerability Management

CyberX provides an objective risk score for your overall IoT and ICS environment along with actionable mitigation recommendations — prioritized by risk — at both the device and network layers.
LEARN MORE

Threat Detection & Response

Using five distinct, ICS-aware self-learning analytics engines, CyberX continuously monitors your IoT and ICS network to detect threats such as targeted attacks, malware, and insider & trusted third-party threats.
LEARN MORE

SOC Integration

A unified IT/OT security strategy is the optimal way to manage your overall digital risk. CyberX integrates natively with your existing security stack to OT-enable your SOC with real-time visibility into OT assets, vulnerabilities, and threats.
LEARN MORE

Centralized Management

CyberX’s scalable architecture enables centralized visibility and control across multiple tiers in the organization, giving you a unified view of IoT and ICS assets and risk across all your sites worldwide.
LEARN MORE

Advanced Use Cases