IoT
9/10/2018
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SecurityMatters Announces ICS Patrol for Network Visibility, Compliance and Control

SecurityMatters ICS Patrol(TM) advances operational management and cybersecurity for critical infrastructure by providing asset visibility for enterprise-grade deployments.

EINDHOVEN, The Netherlands, Sept. 10, 2018 (GLOBE NEWSWIRE) -- Today, SecurityMatters, a global leader in Industrial Control Systems (ICS) network assessment and protection, announces the introduction of SilentDefense ICS Patrol™. This solution deploys optionally in tandem with SecurityMatters’ award winning product SilentDefense to provide improved asset visibility and operational compliance oversight for both IT and OT cybersecurity stakeholders.
With SecurityMatters ICS Patrol™ the asset owner now gains an unprecedented level of access to the real-time operating status of their environment that was impossible to achieve using a passive solution alone. Carefully driven by the SilentDefense advanced passive monitoring capabilities, this added level of visibility is achieved without any risk to the more delicate assets of the ICS network.
ICS Patrol™ is a powerful extension of SecurityMatters’ platform enabling not only increased visibility, but also advanced proactive capabilities, like threat hunting and compliance testing, making this modular solution the industry’s most advanced and flexible non-intrusive active technology available on the market today.
“We can now offer the customer complete visibility without the risk of impacting operations, regardless of the deployment scenario,” said Damiano Bolzoni, SecurityMatters co-founder and Chief Executive Officer. “Customers will be blown away by the amount of relevant information we’re able to provide them within the asset inventory.”
“For a long time, OT security operators have had blind spots in their operation that a completely passive solution couldn’t satisfy,” said Luca Barba, SecurityMatters Product Marketing Manager. “Additionally, the challenges of managing the rigors of a constantly evolving compliance environment is both time-consuming and costly for them. With ICS Patrol™ we’re able to provide customers with one solution that is dually capable of achieving the highest level of operational and threat intelligence, while also aiding compliance with NERC CIP, NIST CSF, IEC 62443 and more.”
As a separate and optional product, ICS Patrol™ extends the capabilities of SilentDefense to securely, selectively and actively query specific hosts on the ICS network. ICS Patrol™ includes Selective Scanning, a technique that uses targeted, non-intrusive network communications to better identify and dissect asset information, files, vulnerabilities, compliance violations and threats.
SecurityMatters ICS Patrol™ Provides:
  1. Enhanced Asset Visibility – Non-intrusively develop comprehensive inventories that include, but are not limited to, host status, OS Version, manufacturer, software and applications, serial numbers, network user behavior and installed patches. 
  2. Multi-Factor Threat Detection – Effectively enabling real-time search for information like vulnerabilities, active services, dangerous files, and known malicious hashes in a non-intrusive manner.
  3. Maximum Control – Enables better network policy development and monitoring using queries and rules in conjunction with internal operations or industry regulations.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18955
PUBLISHED: 2018-11-16
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resour...
CVE-2018-19311
PUBLISHED: 2018-11-16
Centreon 3.4.x allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the "Monitoring > Status Details > Services" screen.
CVE-2018-19312
PUBLISHED: 2018-11-16
Centreon 3.4.x allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI.
CVE-2018-19318
PUBLISHED: 2018-11-16
SRCMS 3.0.0 allows CSRF via admin.php?m=Admin&c=manager&a=update to change the username and password of the super administrator account.
CVE-2018-19319
PUBLISHED: 2018-11-16
SRCMS 3.0.0 allows CSRF via admin.php?m=Admin&c=gifts&a=update to change goods prices with the super administrator's privileges.