Story image

Cyberbit update promises improved visibility into OT networks with SCADAShield 6.0

04 Jul 2018

Cybersecurity simulation and IT/OT detection platforms provider Cyberbit has announced a new release of its SCADAShield OT security platform that provides enhanced asset discovery and visibility for operational technology (OT) networks.

These capabilities provide managers of industrial control system (ICS) networks with real-time, detailed asset information and mapping, and as a result increase operational continuity, enable rapid vulnerability assessment and remediation, and increase overall cyber resilience across the converged IT and OT networks.  

The latest version of SCADAShield provides OT managers with advanced asset tracking and profiling.

SCADAShield is an industrial control systems network monitoring platform which provides visibility, cyber resilience and operational continuity for OT networks by using granular deep-packet inspection (GDPI) of OT communication.

SCADAShield is used by electric grids, transportation networks, manufacturing companies, smart buildings and data centres.

As a result, OT managers have granular visibility into asset attributes such as serial number, device ID and software version.

The platform can now also detect asset vulnerabilities and recommend the best way to remediate them.

This comes in addition to SCADAShield’s capabilities for industrial control network monitoring that includes advanced network mapping, anomaly detection for zero-day threats, automated policy generation and policy enforcement, and signed threat detection.

Cyberbit CEO Adi Dar says, “The recent uptick in attacks on critical infrastructures signifies the security gaps in OT networks.”

Cyberbit is a provider of cyber ranges for cybersecurity training and simulation.

Cyberbit’s threat detection and response platform includes security automation, orchestration and response (SOAR), ICS/SCADA security (OT security), and endpoint detection and response powered by behavioural analysis.

“At the same time, our customer base in the critical infrastructure space is growing and communicating visibility as their main obstacle in achieving operational continuity and security.

“Our new SCADAShield platform addresses this need by providing real-time, informative asset discovery and visibility.”

It is the first system publicly announced to be used for smart building cyber resilience.

SCADAShield is the gold winner of the 2018 Cybersecurity Excellence Awards for best ICS/SCADA Security Product.

Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.