IoT
12/14/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CyberX Adds Secure Remote Access Integration for Critical Industrial Networks

New privileged account security integration reduces risk of unauthorized access to control networks.

BOSTON– CyberX, provider of the most widely-deployed industrial cybersecurity platform for continuously reducing industrial control system (ICS) risk, today announced a new technology integration with CyberArk, the global leader in privileged account security, to provide secure remote access for critical industrial networks. CyberX is also a new member of the C3 Alliance, CyberArk’s global technology partner program.

ICS security is rapidly becoming a top-down priority for industrial and critical infrastructure organizations worldwide. Recent targeted attacks on energy companies such as Dragonfly 2.0 demonstrate that adversaries are seeking to access industrial networks using credentials stolen from privileged users such as control engineers and third-party maintenance personnel. This well-known approach — leveraging trusted remote connections such as VPNs to bypass network perimeter controls — was also used in the 2015 Ukrainian grid attack.

CyberX is the market leader in ICS and IIoT security with deployments across energy & utilities, oil & gas, manufacturing, pharmaceuticals, chemicals, nuclear and water. Since 2013, the company has leveraged its passive monitoring and proprietary Network Traffic Analysis (NTA) algorithms to assess ICS risk for more than 375 production ICS networks worldwide. Purpose-built for ICS security and developed by military cyber experts with nation-state experience defending critical infrastructure, the CyberX platform delivers continuous ICS threat monitoring and asset discovery, ICS threat intelligence, and non-invasive risk and vulnerability assessments.

The CyberArk solution offers a wide range of capabilities for securing privileged credentials and controlling remote access to critical assets such as SCADA workstations and Human Machine Interfaces (HMIs). The integration of CyberX’s continuous ICS monitoring platform with the CyberArk Privileged Account Security Solution enables industrial organizations to:

·         Receive real-time alerts whenever CyberX detects remote sessions on the ICS network that were not authorized by the CyberArk solution. Additionally, the CyberX platform incorporates ICS-specific behavioral analytics and self-learning to immediately detect anomalous behavior indicating a potential breach of the OT network

·         Continuously monitor and audit privileged user sessions in the CyberX console, including which ICS devices are being accessed and whether the session is being recorded by CyberArk

·         Perform incident response, threat hunting and threat modeling around remote access. To enable rapid breach response, SOC analysts can now query the CyberX event timeline to identify all remote sessions based on forensic details such as which remote access protocols were used (SSH, RDP, etc.) and whether sessions were authorized by CyberArk. Additionally, they can leverage CyberX’s exclusive automated threat modeling capability to proactively identify and secure multi-step attack chains that incorporate remote access connections to compromise critical assets

“Our mission is to reduce ICS risk by providing our customers with deep and continuous real-time visibility into all activity, threats and assets on their ICS networks,” said Omer Schneider, CEO and co-founder of CyberX. “By tightly integrating the CyberX platform with the market-leading CyberArk Privileged Account Security Solution, we’re significantly enhancing that visibility to reduce risk from one of the top attack vectors targeting industrial environments today.”

The CyberArk Privileged Account Security Solution is a complete solution to protect, monitor, alert and respond to privileged account-related risk. The proven platform offers a wide range of capabilities including the ability to secure and control access to privileged credentials and secrets based on policy; isolate, monitor and record privileged sessions; respond to anomalous privileged activity and halt in-progress attacks, and enforce least-privileged policies across all endpoints.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.