The Cyberx Platform in Industrial Control Systems Security Solutions

Are you from this Company?
The Cyberx Platform
Massachusetts, US
2013
Below $10 MN
Enterprise
25 Likes
80 Buyers Negotiating

Summary

CyberX platform is the simplest, most mature, and most interoperable solution for auto-discovering assets, identifying critical vulnerabilities and attack vectors, and continuously monitoring ICS networks for malware and targeted attacks. What’s more, CyberX provides seamless integration with existing SOC workflows for unified IT/OT security governance.

Product Features:

RAPID NON-INTRUSIVE DEPLOYMENT

The CyberX appliance connects to a SPAN port or network TAP and immediately begins collecting ICS network traffic via passive (agentless) monitoring. It has zero impact on OT networks since it isn’t placed in the data path and doesn’t actively scan OT devices.

RAPID NON-INTRUSIVE DEPLOYMENT

CyberX appliance quickly begins collecting ICS network traffic through passive monitoring when connected to SPAN port or network TAP. Since it is not placed in the data path, it has no impact on OT networks.

CENTRAL MANAGEMENT

CyberX’s Central Manager provides a complete view of all assets which helps in identifying the position of assets based on tailored filters such as type (PLC, RTU, DCS, etc.), manufacturer, model, and firmware revision level. Central Manager delivers a real-time monitoring of OT risk indicators and alerts over all facilities

• It firmly combined with SOC workflows and runbooks
• Central Manager provides centralized deployment of software, threat intelligence, and configuration updates to allow easy moderation of activities and cross-site correlation of threats.

REAL-TIME ANOMALY DETECTION OF ICS THREATS

CyberX platform identifies anomalies through monitoring and several types of analytics engines that integrate self-learning to eliminate updating signatures or defining rules. The software uses ICS behavioural analytics and data science to analyse OT network traffic for anomalies which includes:

• The use of packet structures and field values that violate ICS protocol specifications
• Behaviours indicating the presence of known malware such as WannaCry/ NotPetya
• Policy violations • Operational issues such as early signs of equipment failure; and unusual machine-to-machine (M2M) communications and behaviors.

Discussions

Discussions (1)
Buyer
Plewex's requirement
22/11/2021
"Network monitoring"
Like
Comment
Strengths
  • +12
    Regulatory compliance
  • +11
    ODVA
  • +9
    Education & Training
  • +5
    Incident Response
  • +10
    Managed Security Services
  • +11
    Support & Maintenance
  • +5
    Risk and Threat Assessment
  • +7
    Risk Based Asset Classification
  • +9
    Cloud
  • +12
    Hybrid
  • +10
    On-premise
  • +10
    Asset visibility and safety / Real-time monitoring
  • +12
    Minimize risk - backup and recovery
  • +9
    Predictive cybersecurity
  • +8
    Secure remote access
  • +6
    Security automation / central management
  • +13
    Cyber attack simulation
  • +7
    Design & Integration
  • +14
    Implementation
  • +9
    Network traffic anomaly detection tools
Cautions
  • -5
    As a Service
  • -8
    Module Based
  • -14
    Outcome Based
  • -7
    Per Node/Asset
  • -6
    Per User
  • -13
    EDDL - Electronic Device Description Language
  • -12
    FDT – field device tool
  • -8
    Risk/VaR Simulation
  • -9
    Software Enabled Methodology
  • -7
    Avoid shutdowns
  • -10
    Control system modernization / IT-OT consolidation
  • -5
    Increased productivity / improve system performance
  • -14
    Integration of legacy devices
  • -13
    Lower TCO
  • -11
    Network segmentation
  • -9
    Strategy consulting
  • -10
    IOC detection tools
  • -14
    Log review tools
  • -8
    Multi-purpose tools
  • -11
    Outlier analysis tools
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup