Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
9/10/2018
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SecurityMatters Announces ICS Patrol for Network Visibility, Compliance and Control

SecurityMatters ICS Patrol(TM) advances operational management and cybersecurity for critical infrastructure by providing asset visibility for enterprise-grade deployments.

EINDHOVEN, The Netherlands, Sept. 10, 2018 (GLOBE NEWSWIRE) -- Today, SecurityMatters, a global leader in Industrial Control Systems (ICS) network assessment and protection, announces the introduction of SilentDefense ICS Patrol™. This solution deploys optionally in tandem with SecurityMatters’ award winning product SilentDefense to provide improved asset visibility and operational compliance oversight for both IT and OT cybersecurity stakeholders.
With SecurityMatters ICS Patrol™ the asset owner now gains an unprecedented level of access to the real-time operating status of their environment that was impossible to achieve using a passive solution alone. Carefully driven by the SilentDefense advanced passive monitoring capabilities, this added level of visibility is achieved without any risk to the more delicate assets of the ICS network.
ICS Patrol™ is a powerful extension of SecurityMatters’ platform enabling not only increased visibility, but also advanced proactive capabilities, like threat hunting and compliance testing, making this modular solution the industry’s most advanced and flexible non-intrusive active technology available on the market today.
“We can now offer the customer complete visibility without the risk of impacting operations, regardless of the deployment scenario,” said Damiano Bolzoni, SecurityMatters co-founder and Chief Executive Officer. “Customers will be blown away by the amount of relevant information we’re able to provide them within the asset inventory.”
“For a long time, OT security operators have had blind spots in their operation that a completely passive solution couldn’t satisfy,” said Luca Barba, SecurityMatters Product Marketing Manager. “Additionally, the challenges of managing the rigors of a constantly evolving compliance environment is both time-consuming and costly for them. With ICS Patrol™ we’re able to provide customers with one solution that is dually capable of achieving the highest level of operational and threat intelligence, while also aiding compliance with NERC CIP, NIST CSF, IEC 62443 and more.”
As a separate and optional product, ICS Patrol™ extends the capabilities of SilentDefense to securely, selectively and actively query specific hosts on the ICS network. ICS Patrol™ includes Selective Scanning, a technique that uses targeted, non-intrusive network communications to better identify and dissect asset information, files, vulnerabilities, compliance violations and threats.
SecurityMatters ICS Patrol™ Provides:
  1. Enhanced Asset Visibility – Non-intrusively develop comprehensive inventories that include, but are not limited to, host status, OS Version, manufacturer, software and applications, serial numbers, network user behavior and installed patches. 
  2. Multi-Factor Threat Detection – Effectively enabling real-time search for information like vulnerabilities, active services, dangerous files, and known malicious hashes in a non-intrusive manner.
  3. Maximum Control – Enables better network policy development and monitoring using queries and rules in conjunction with internal operations or industry regulations.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Cognitive Bias Can Hamper Security Decisions
Kelly Sheridan, Staff Editor, Dark Reading,  6/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12855
PUBLISHED: 2019-06-16
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
CVE-2013-7472
PUBLISHED: 2019-06-15
The "Count per Day" plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter.
CVE-2019-12839
PUBLISHED: 2019-06-15
In OrangeHRM 4.3.1 and before, there is an input validation error within admin/listMailConfiguration (txtSendmailPath parameter) that allows authenticated attackers to achieve arbitrary command execution.
CVE-2019-12840
PUBLISHED: 2019-06-15
In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.
CVE-2019-12835
PUBLISHED: 2019-06-15
formats/xml.cpp in Leanify 0.4.3 allows for a controlled out-of-bounds write in xml_memory_writer::write via characters that require escaping.