sb-as logo
Story image

Forescout strengthens investment in OT security

27 May 2019

Device visibility and control solutions provider Forescout Technologies has announced its continued investment in OT security with the release of SilentDefense 4.0.

Building on its existing OT network monitoring and intelligence platform, Forescout’s latest features aims to provide enterprises with improved productivity, lower risk profiles and faster mitigation of threats. 

“The convergence of IT and OT is increasing the complexity and vulnerability of previously isolated ICS networks,” says Forescout OT business unit vice president Damiano Bolzoni.

“Through our latest release, CISOs and OT asset owners will gain greater visibility and richer context of network assets, and their operating status than ever before.”

Forescout’s SilentDefense 4.0 comes equipped with the Enterprise Command Center (ECC) and ICS Patrol.

The ECC is a software solution and product that aggregates the information coming from multiple SilentDefense Command Centres in a single enterprise dashboard for monitoring global systems health, assets, vulnerabilities and threats.

This will enable enterprise customers to scale their oversight and control over large, multi-network deployment ICS scenarios.

ICS Patrol lets users automate numerous compliance tasks.

With this modularity and flexibility, cybersecurity stakeholders are able to maintain detailed regional control over their SilentDefense installations, while scaling throughout their IT/ OT infrastructure. 

Forescout’s SilentDefense also offers the following capabilities: 

Deeper asset visibility and security with ICS Patrol

ICS Patrol is an optional, passive-driven active sensor that allows OT-specific scanning of IT and OT devices.

ICS Patrol discovers assets in a given network (or network segment) and gathers as much information as possible about them in terms of asset inventory/device fingerprinting. 

Forescout gives customers the best of both (active and passive) worlds when it comes to cybersecurity by merging passive anomaly detection with proactive cybersecurity capabilities to non-intrusively extend ICS network visibility and operating intelligence beyond any technology available. 

Forescout’s approach brings additional visibility and bolsters scalability for enterprise-grade deployments. 

Further innovations for OT and automation partner integrations

With the 4.0 release SilentDefense now adds support for new protocols for key technology partners, such as ABB, Emerson and Yokogawa, extending the visibility of non-IP low-level devices.

In addition, Forescout has further extended the ITL capability to proactively identify and manage cyber threats and vulnerabilities and custom threat checks. 

Solutions for smart meters

SilentDefense 4.0 comes with the inclusion of DLMS/COSEM protocol support, critical for integrated cybersecurity strategies within the smart meter space. DLMS/COSEM stands for Device Language Message Specification/Companion Specification for Energy Metering, which is critical for the visibility and management of smart meters.

The IEC 62056 standards are the International Standard versions of the DLMS/COSEM specification. After the building automation services (BAS) extension, this is a further step toward the vision of full Industrial Internet of Things (IIoT) coverage.

Story image
BlackBerry, Microsoft enter partnership for Teams integration
"Integrating BlackBerry AtHoc will ensure that any organisation managing critical events using Teams is able to contact, alert, and account for everyone within the organisation directly."More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
Report: Power utilities increasingly at risk of devastating cyber-attacks
“Utilities’ existing systems are becoming increasingly connected through sensors and networks, and, due to their dispersed nature, are even more difficult to control.”More
Story image
Attack from DOS: In Zero We Trust
In combination with malware, DDoS attacks on banks have been used to cause distraction so the transfer of stolen funds goes unnoticed. More