sb-as logo
Story image

Cyberbit update promises improved visibility into OT networks with SCADAShield 6.0

04 Jul 2018

Cybersecurity simulation and IT/OT detection platforms provider Cyberbit has announced a new release of its SCADAShield OT security platform that provides enhanced asset discovery and visibility for operational technology (OT) networks.

These capabilities provide managers of industrial control system (ICS) networks with real-time, detailed asset information and mapping, and as a result increase operational continuity, enable rapid vulnerability assessment and remediation, and increase overall cyber resilience across the converged IT and OT networks.  

The latest version of SCADAShield provides OT managers with advanced asset tracking and profiling.

SCADAShield is an industrial control systems network monitoring platform which provides visibility, cyber resilience and operational continuity for OT networks by using granular deep-packet inspection (GDPI) of OT communication.

SCADAShield is used by electric grids, transportation networks, manufacturing companies, smart buildings and data centres.

As a result, OT managers have granular visibility into asset attributes such as serial number, device ID and software version.

The platform can now also detect asset vulnerabilities and recommend the best way to remediate them.

This comes in addition to SCADAShield’s capabilities for industrial control network monitoring that includes advanced network mapping, anomaly detection for zero-day threats, automated policy generation and policy enforcement, and signed threat detection.

Cyberbit CEO Adi Dar says, “The recent uptick in attacks on critical infrastructures signifies the security gaps in OT networks.”

Cyberbit is a provider of cyber ranges for cybersecurity training and simulation.

Cyberbit’s threat detection and response platform includes security automation, orchestration and response (SOAR), ICS/SCADA security (OT security), and endpoint detection and response powered by behavioural analysis.

“At the same time, our customer base in the critical infrastructure space is growing and communicating visibility as their main obstacle in achieving operational continuity and security.

“Our new SCADAShield platform addresses this need by providing real-time, informative asset discovery and visibility.”

It is the first system publicly announced to be used for smart building cyber resilience.

SCADAShield is the gold winner of the 2018 Cybersecurity Excellence Awards for best ICS/SCADA Security Product.

Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Video: 10 Minute IT Jams - Who is Okta?
Okta is an identity and access management company, specialising in secure user authentication. It's an enterprise-grade identity management service, built for the cloud, but compatible with many on-premises applications.More
Story image
Almost a third of malware threats previously unknown - HP report
A new report has found 29% of malware captured was previously unknown due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection. More
Story image
Mobile devices biggest enterprise security threat - report
Businesses have left themselves vulnerable and open to cyber criminals in the rush to ensure their workforce could operate remotely during the Covid-19 pandemic.More
Story image
Kroll completes Redscan acquisition, expands cyber risk portfolio
With the addition of Redscan and its extended detection and response (XDR) enabled security operations centre (SOC) platform, Kroll expands its Kroll Responder capabilities to support a wider array of cloud and on-premise telemetry sources.More
Story image
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.More