DATA SECURITY

SCADAfence Partners with Keysight Technologies To Provide Visibility and Industrial Cyber Security for OT Infrastructures

SCADAfence | September 23, 2021

SCADAfence, the global leader in cybersecurity for Operational Technology (OT) & Internet of Things (IoT) environments, today announced a partnership with Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, to amplify network visibility and cybersecurity to some of the world's most complex OT networks. This new partnership will help organizations gain better control over their industrial environments and detect malicious activities, reducing risk through continuous monitoring and proactive mitigation.

As more critical network infrastructures adopt advanced automation systems to integrate their OT and SCADA technologies, securing the increased attack surface from threats has become more challenging with each attack. Managing these risks has become extremely complicated due to the fact that most OT network environments and devices are not monitored directly by security personnel. Consequently, the Industrial Control System (ICS) networks are harder to monitor and secure as they’re very diverse, and most of the time, they operate with an increased risk of industrial-specific vulnerabilities.

This new partnership between SCADAfence and Keysight will allow organizations to have amplified visibility into OT and IT networks and increased detection and response capabilities in their OT environments. SCADAfence’s non-intrusive platform for deep packet inspection (DPI) together with Keysight’s network test access points (TAPs) and Network Packet Brokers (NPB) solutions will work together to provide complete traffic visibility, security, and asset inventory management in real-time to their industrial customers.Protecting and securing OT environments from security threats and anomalies has become a top priority for the industrial sector and we provide deep packet-level visibility with accurate real-time analytics

Elad Ben-Meir, CEO of SCADAfence. 
 
"We're excited to partner with Keysight Technologies to help industrial organizations leverage both solutions for better visibility and more advanced packet information within OT environments.”

The deployment of SCADAfence and Keysight Technologies together provides increased real-time visibility into OT environments, detailed asset visibility and continuous threat detection for oil and gas facilities, manufacturing sites, water and wastewater environments, automotive, and other industrial infrastructures. With the ability to collect different data across all OT environments, Keysight will be able to provide more actionable insights for customers on the threats affecting their IT environments and SCADAfence will map out the connections between IT and OT to assess the potential impacts to operational environments.

“Critical infrastructures are being targeted more than ever and are facing more security threats in the OT and IoT networks. The mitigation process can take from weeks to possibly months to patch vulnerabilities within the more complex environments,” said Taran Singh, vice president, enterprise solutions, Keysight. “Our joint-partnership with SCADAfence will allow our customers and other industrial organizations to speed up that process from weeks to a few days.”

About SCADAfence:
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world’s most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently.

Spotlight

"The debate is over: Use of mobile devices such as note books, tablets and smartphones is trending up—way up—in enterprises of nearly all sizes and in all industries. Research indicates that 62% of U.S. employees use a smartphone to access company applications and services,1 and 54% of respondents to another study indicated they are increasing application development for mobile devices. Global tablet use for business workloads also is on the rise; nearly 20% of worldwide tablet purchases will be made directly by enterprises by 2017"

Spotlight

"The debate is over: Use of mobile devices such as note books, tablets and smartphones is trending up—way up—in enterprises of nearly all sizes and in all industries. Research indicates that 62% of U.S. employees use a smartphone to access company applications and services,1 and 54% of respondents to another study indicated they are increasing application development for mobile devices. Global tablet use for business workloads also is on the rise; nearly 20% of worldwide tablet purchases will be made directly by enterprises by 2017"

Related News

DATA SECURITY

Smithers Announces the Launch of Information Security Services

Smithers | May 25, 2021

Smithers, a leading provider of testing, consulting, information, and compliance services, is pleased to announce the launch of its information security services department. This agency will provide auditing and certification services for NIST SP 800-171 and the Cybersecurity Maturity Model Certification (CMMC), as well as other customized information security offerings. Smithers Quality Assessments Division offers 25+ years of high-touch, value-added third-party auditing expertise to the CMMC program, including trained, professional auditors to perform CMMC assessments for organizations that are current suppliers to the United States (US) Department of Defense, as well as those looking to meet the requirements of being a supplier. Smithers' information security service offering ensures the security of clients' sensitive data by delivering reliable assessments on time and with a high level of touch. "Information security threats continue to intensify as a significant concern to organizations of all sizes," says Jeanette Preston, President of Smithers Quality Assessments Division. "As a matter of business continuity, many companies would be required to ensure sensitive data security as a requirement to do business with defense, governmental agencies, and highly regulated industries." The information security services department will be launched and led by Aaron Troschinetz, General Manager for Smithers Quality Assessments Division in North America. "During audits, we see that clients have a genuine need for these facilities," Troschinetz says. "Companies do not need multiple vendors because we provide information security in addition to our existing auditing and certification services. Smithers is now capable of serving as their full-service trusted partner." About Smithers Smithers is a multinational provider of testing, consulting, information, and compliance services that were founded in 1925 and is headquartered in Akron, Ohio. Smithers serves customers in the transportation, life science, packaging, fabrics, parts, consumer, and energy sectors through laboratories and operations in North America, Europe, and Asia. Smithers integrates science, technology, and business expertise to provide accurate data on time and with a high touch, allowing consumers to innovate with confidence.

Read More

SOFTWARE SECURITY

Absolute Software Reveals Resilient Zero Trust Security Advances

Absolute Software | April 11, 2022

Absolute Software, a leading provider of self-healing endpoint and secure access solutions, today announced enhancements to its Secure Access product portfolio (formerly NetMotion by Absolute), allowing customers to reduce risk and improve UX in today's borderless, and work-from-anywhere environments. Absolute is introducing a number of new product improvements with this version, including self-healing Zero Trust Network Access (ZTNA), a resilient deployment architecture, and increased network and ZTNA policy intelligence. Absolute was recently named a Representative Vendor in Gartner's Zero Trust Network Access Market Guide for February 2022. Among the important findings in the report, Gartner states, “An increased focus by end-user organizations on zero trust strategies — and a desire to provide a more secure, flexible hybrid workforce connectivity — is driving increased interest in the ZTNA market.” Joe Savarese, EVP of Secure Access Products at Absolute said that “This release is an important milestone in our mission to be the leading ZTNA solution for the perimeter-less workplace, differentiated by resilience and reliability. The results from our customer beta test – our largest and most successful to date – validate that these new capabilities meet urgent and significant customer needs. As seamless secure access has become imperative for the perimeter-less workplace, administrators need easy-to-implement ZTNA solutions that deliver both maximum security and an optimal user experience.” IT and security professionals can now secure essential infrastructure, apps, devices, and data without sacrificing user productivity thanks to these product upgrades. The following are some of the advantages: Truly resilient ZTNA: Absolute's self-healing ZTNA client for Windows is capable of autonomously repairing or reinstalling itself if tampered with, unintentionally deleted, or otherwise ceased operating – guaranteeing that it stays healthy and provides the full intended value. Resilient deployment architecture: Absolute has introduced Resilience to its distributed network architecture utilizing active-active server technology, bringing the advantages of Software-as-a-Service (SaaS) to customer-managed settings, such as high availability, horizontal scale-out, and zero downtime updates. This ground-breaking solution allows individual system components to self-heal in the case of a breakdown and assures that other servers may take over if necessary, preventing interruption or denial-of-service to end users without the need for administrator involvement. Dynamic re-authentication and secure access enforcement: Customers may now more easily implement current cloud authentication solutions to reduce the risk exposure associated with compromised credentials via dynamic re-authentication and secure access enforcement. Enhancements include the ability to challenge a user's security credentials if circumstances or the environment change and compel them to re-authenticate using an existing mechanism, such as Multi-factor Authentication (MFA). Foundational zero trust security: New ZTNA policy actions improve the basis of zero trust security posture, boosting the capacity to safeguard workers from accessing harmful apps and network locations and restricting lateral movement. Expanded diagnostics and monitoring capabilities: Enhanced diagnoses and monitoring capabilities: With the introduction of Absolute Insights for Network, the firm has expanded its current diagnostics and monitoring capabilities (formerly NetMotion Mobile IQ). This includes ARM device support for MacOS and Windows, as well as improved intelligence for 5G networks (e.g., signal quality, network availability, network coverage, and network usage) and ZTNA policy enforcement (e.g., policy-blocked hosts/websites, addresses/ports, and web reputation) to reduce phishing, smishing, and other malicious activity.

Read More

DATA SECURITY

Elisity to Close $26-Million Round for Cognitive Trust CyberSecurity Platform

Elisity | June 17, 2021

The new platform for behavior and identity-based enterprise cybersecurity, Elisity, Inc., the pioneer of Cognitive Trust™, has announced a Series A funding round totaling $26 million. It is co-led by AllegisCyber Capital and Two Bear Capital. Atlantic Bridge, the previous seed investor, is participating. The present subsidizing will scale Elisity to satisfy customer needs for its cloud-delivered cybersecurity stage that can investigate the identity and context of individuals, applications, and gadgets—including IoT and OT—any place they're working. The platform can comprehend, engage and progressively adjust security from the edge to the cloud by learning conduct to review hazards, consequently and constantly streamline security assurance. Elisity is the principal organization to offer a solitary online protection stage that is adequately astute to see how resources and individuals associate past corporate edges and powerfully adjust security for each client, gadget, information, and application from the edge to the cloud. Elisity's Cognitive Trust stage wires character and AI-driven social insight to ceaselessly evaluate hazard and quickly upgrade access, availability, and security arrangements that follow resources and individuals any place they go. Elisity helps endeavor class associations, everything being equal, and ventures get through the present siloed systems administration and-security bunch difficulties by incorporating resource the board, availability, and security. Three co-founders began Elisity: Burjiz Pithawala, chief product officer; Sundher Narayan, chief architect; and Srinivas Sardar, vice president of engineering, who all previously held leadership roles product development, engineering, and architecture at Cisco. The chief group is driven by James Winebrenner, CEO, who drove the go-to-market procedure for Viptela from pre-dispatch through the deal to Cisco in 2017, having additionally held influential leader positions at Cisco, Aviatrix, and Checkpoint Software. Strategic advisors include security and networking leaders such as Greg Akers (former SVP Advanced Security Research and Governments at Cisco), Khalid Raza (co-founder of Viptela and CEO and founder of Graphient), Brian Long (co-founder and managing partner at Atlantic Bridge and on Elisity's Board of Directors), and Jeff Tantsura (Internet Architecture Board). Spencer Tall and Mike Goguen will join Brian Long on the Elisity board due to today's transaction. About Elisity Elisity understands behaviors and identity to simplify connectivity, asset and user access, and security from the initiative edge to the cloud. Elisity invented the AI-powered Cognitive Trust platform to learn behavior, measure risk enthusiastically, and promptly adapt apparent access policies for people, devices, data, and applications. Elisity is based in San Jose. The company is backed by AllegisCyber Capital, Two Bear Capital, and Atlantic Bridge.

Read More