Story image

Cyberbit update promises improved visibility into OT networks with SCADAShield 6.0

04 Jul 2018

Cybersecurity simulation and IT/OT detection platforms provider Cyberbit has announced a new release of its SCADAShield OT security platform that provides enhanced asset discovery and visibility for operational technology (OT) networks.

These capabilities provide managers of industrial control system (ICS) networks with real-time, detailed asset information and mapping, and as a result increase operational continuity, enable rapid vulnerability assessment and remediation, and increase overall cyber resilience across the converged IT and OT networks.  

The latest version of SCADAShield provides OT managers with advanced asset tracking and profiling.

SCADAShield is an industrial control systems network monitoring platform which provides visibility, cyber resilience and operational continuity for OT networks by using granular deep-packet inspection (GDPI) of OT communication.

SCADAShield is used by electric grids, transportation networks, manufacturing companies, smart buildings and data centres.

As a result, OT managers have granular visibility into asset attributes such as serial number, device ID and software version.

The platform can now also detect asset vulnerabilities and recommend the best way to remediate them.

This comes in addition to SCADAShield’s capabilities for industrial control network monitoring that includes advanced network mapping, anomaly detection for zero-day threats, automated policy generation and policy enforcement, and signed threat detection.

Cyberbit CEO Adi Dar says, “The recent uptick in attacks on critical infrastructures signifies the security gaps in OT networks.”

Cyberbit is a provider of cyber ranges for cybersecurity training and simulation.

Cyberbit’s threat detection and response platform includes security automation, orchestration and response (SOAR), ICS/SCADA security (OT security), and endpoint detection and response powered by behavioural analysis.

“At the same time, our customer base in the critical infrastructure space is growing and communicating visibility as their main obstacle in achieving operational continuity and security.

“Our new SCADAShield platform addresses this need by providing real-time, informative asset discovery and visibility.”

It is the first system publicly announced to be used for smart building cyber resilience.

SCADAShield is the gold winner of the 2018 Cybersecurity Excellence Awards for best ICS/SCADA Security Product.

Survey: IT pros nostalgic over on-prem data centre visibility
There are significant security and monitoring challenges faced by IT staff responsible for managing public and private cloud deployments.
61% of CIOs believe employees leak data maliciously
Egress conducted a survey to examine the root causes of employee-driven data breaches, their frequency, and impact.
Opinion: BYOD can be secure with the right measures
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Sonatype and HackerOne partner on open source vulnerability reporting
Without a standard for responsible disclosure, even those who want to disclose vulnerabilities responsibly can get frustrated with the process.
OutSystems and Boncode team up for better code analysis
The Boncode and OutSystems alliance aims to help organisations to build fast and feel comfortable that the work they're delivering is at peak quality levels.
Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.
SIS announces a partnership with Platform 4
“We are looking forward to a strong future in the New Zealand security industry with this global giant as our strategic partner."
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.