Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
9/10/2018
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SecurityMatters Announces ICS Patrol for Network Visibility, Compliance and Control

SecurityMatters ICS Patrol(TM) advances operational management and cybersecurity for critical infrastructure by providing asset visibility for enterprise-grade deployments.

EINDHOVEN, The Netherlands, Sept. 10, 2018 (GLOBE NEWSWIRE) -- Today, SecurityMatters, a global leader in Industrial Control Systems (ICS) network assessment and protection, announces the introduction of SilentDefense ICS Patrol™. This solution deploys optionally in tandem with SecurityMatters’ award winning product SilentDefense to provide improved asset visibility and operational compliance oversight for both IT and OT cybersecurity stakeholders.
With SecurityMatters ICS Patrol™ the asset owner now gains an unprecedented level of access to the real-time operating status of their environment that was impossible to achieve using a passive solution alone. Carefully driven by the SilentDefense advanced passive monitoring capabilities, this added level of visibility is achieved without any risk to the more delicate assets of the ICS network.
ICS Patrol™ is a powerful extension of SecurityMatters’ platform enabling not only increased visibility, but also advanced proactive capabilities, like threat hunting and compliance testing, making this modular solution the industry’s most advanced and flexible non-intrusive active technology available on the market today.
“We can now offer the customer complete visibility without the risk of impacting operations, regardless of the deployment scenario,” said Damiano Bolzoni, SecurityMatters co-founder and Chief Executive Officer. “Customers will be blown away by the amount of relevant information we’re able to provide them within the asset inventory.”
“For a long time, OT security operators have had blind spots in their operation that a completely passive solution couldn’t satisfy,” said Luca Barba, SecurityMatters Product Marketing Manager. “Additionally, the challenges of managing the rigors of a constantly evolving compliance environment is both time-consuming and costly for them. With ICS Patrol™ we’re able to provide customers with one solution that is dually capable of achieving the highest level of operational and threat intelligence, while also aiding compliance with NERC CIP, NIST CSF, IEC 62443 and more.”
As a separate and optional product, ICS Patrol™ extends the capabilities of SilentDefense to securely, selectively and actively query specific hosts on the ICS network. ICS Patrol™ includes Selective Scanning, a technique that uses targeted, non-intrusive network communications to better identify and dissect asset information, files, vulnerabilities, compliance violations and threats.
SecurityMatters ICS Patrol™ Provides:
  1. Enhanced Asset Visibility – Non-intrusively develop comprehensive inventories that include, but are not limited to, host status, OS Version, manufacturer, software and applications, serial numbers, network user behavior and installed patches. 
  2. Multi-Factor Threat Detection – Effectively enabling real-time search for information like vulnerabilities, active services, dangerous files, and known malicious hashes in a non-intrusive manner.
  3. Maximum Control – Enables better network policy development and monitoring using queries and rules in conjunction with internal operations or industry regulations.
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36289
PUBLISHED: 2021-05-12
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and fro...
CVE-2021-32606
PUBLISHED: 2021-05-11
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
CVE-2021-3504
PUBLISHED: 2021-05-11
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to...
CVE-2021-20309
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to ...
CVE-2021-20310
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this...