SOC
Integration

CyberX reduces complexity and eliminates IT/OT silos by integrating out-of-the-box with your existing SOC workflows and security stack.

OT-ENABLE YOUR SOC

Visibility and context are key to identifying and responding quickly and effectively to incidents.

As centralized SOCs gain responsibility for IoT and ICS as well as IT security, they now need continuous visibility and context into all OT-relevant information. What’s more, in order to rapidly block malicious traffic that can impact operational processes, security teams also need tight integration between detection platforms like CyberX and prevention systems like next-generation firewalls. That’s why CyberX provides your SOC with granular information about all of your IoT and ICS environment.

Group 1339@2x

OT assets and their current state

Group 1340@2x

OT network topology and connectivity with the IT network 

Group 1341@2x

OT vulnerabilities at both the network and endpoint layers 

Group 1342@2x

OT network traffic and behavioral analytics 

As the industry’s most open and interoperable industrial cybersecurity platform, CyberX reduces complexity and eliminates IT/OT silos by integrating out-of-the-box with your existing SOC workflows and security stack including:

 

  • SIEMs such as IBM QRadar, Splunk, ArcSight, LogRhythm, RSA NetWitness, and others
  • Security orchestration and ticketing systems such as ServiceNow, IBM Resilient, and others
  • Secure remote access solutions such as CyberArk Privileged Session Manager (PSM), BeyondTrust, and others
  • Secure network access control (NAC) systems such as Aruba ClearPass, ForeScout CounterACT, and others
  • Firewalls such as Palo Alto Networks, Checkpoint, Cisco, and others
soc-in-scr

CyberX’s ICS Threat Monitoring App for QRadar provides in-depth ICS threat information to SOC analysts.

CyberX’s ICS Threat Monitoring App for QRadar provides in-depth ICS threat information to SOC analysts.

 We are delighted to welcome CyberX to the Palo Alto Networks Application Framework developer community. The framework provides our customers with superior security through cloud-based apps developed by innovative security providers, large and small. Together, we are fueling innovation in the cybersecurity market with apps that are built rapidly, engineered on a common framework, and deliver unique value while solving our customers’ toughest security challenges.

Lee Klarich, chief product officer, Palo Alto Networks

Primary Use Cases

Every organization is at a different stage in their IoT & ICS cybersecurity maturity. Just as adversaries are becoming increasingly sophisticated, organizations are also continually challenged to up their game. CyberX enables you to easily adopt new capabilities to match your organizational readiness.

Asset Management

You can’t protect what you don’t know about. CyberX auto-discovers your IoT and ICS network topology and provides detailed information about all your assets including device type, manufacturer, model, serial number, firmware revision, open ports, etc.
LEARN MORE

Risk & Vulnerability Management

CyberX provides an objective risk score for your overall IoT and ICS environment along with actionable mitigation recommendations — prioritized by risk — at both the device and network layers.
LEARN MORE

Threat Detection & Response

Using five distinct, ICS-aware self-learning analytics engines, CyberX continuously monitors your IoT and ICS network to detect threats such as targeted attacks, malware, and insider & trusted third-party threats.
LEARN MORE

SOC Integration

A unified IT/OT security strategy is the optimal way to manage your overall digital risk. CyberX integrates natively with your existing security stack to OT-enable your SOC with real-time visibility into OT assets, vulnerabilities, and threats.
LEARN MORE

Centralized Management

CyberX’s scalable architecture enables centralized visibility and control across multiple tiers in the organization, giving you a unified view of IoT and ICS assets and risk across all your sites worldwide.
LEARN MORE

Advanced Use Cases