SecurityMatters Announces ICS Patrol™ for Network Visibility, Compliance and ControlSecurityMatters Announces ICS Patrol™ for Network Visibility, Compliance and Control
SecurityMatters ICS Patrol™ advances operational management and cybersecurity for critical infrastructure by providing asset visibility for enterprise-grade deployments.
September 10, 2018
EINDHOVEN, The Netherlands, Sept. 10, 2018 (GLOBE NEWSWIRE) -- Today, SecurityMatters, a global leader in Industrial Control Systems (ICS) network assessment and protection, announces the introduction of SilentDefense ICS Patrol™. This solution deploys optionally in tandem with SecurityMatters’ award winning product SilentDefense to provide improved asset visibility and operational compliance oversight for both IT and OT cybersecurity stakeholders.
With SecurityMatters ICS Patrol™ the asset owner now gains an unprecedented level of access to the real-time operating status of their environment that was impossible to achieve using a passive solution alone. Carefully driven by the SilentDefense advanced passive monitoring capabilities, this added level of visibility is achieved without any risk to the more delicate assets of the ICS network.
ICS Patrol™ is a powerful extension of SecurityMatters’ platform enabling not only increased visibility, but also advanced proactive capabilities, like threat hunting and compliance testing, making this modular solution the industry’s most advanced and flexible non-intrusive active technology available on the market today.
“We can now offer the customer complete visibility without the risk of impacting operations, regardless of the deployment scenario,” said Damiano Bolzoni, SecurityMatters co-founder and Chief Executive Officer. “Customers will be blown away by the amount of relevant information we’re able to provide them within the asset inventory.”
“For a long time, OT security operators have had blind spots in their operation that a completely passive solution couldn’t satisfy,” said Luca Barba, SecurityMatters Product Marketing Manager. “Additionally, the challenges of managing the rigors of a constantly evolving compliance environment is both time-consuming and costly for them. With ICS Patrol™ we’re able to provide customers with one solution that is dually capable of achieving the highest level of operational and threat intelligence, while also aiding compliance with NERC CIP, NIST CSF, IEC 62443 and more.”
As a separate and optional product, ICS Patrol™ extends the capabilities of SilentDefense to securely, selectively and actively query specific hosts on the ICS network. ICS Patrol™ includes Selective Scanning, a technique that uses targeted, non-intrusive network communications to better identify and dissect asset information, files, vulnerabilities, compliance violations and threats.
SecurityMatters ICS Patrol™ Provides:
Enhanced Asset Visibility – Non-intrusively develop comprehensive inventories that include, but are not limited to, host status, OS Version, manufacturer, software and applications, serial numbers, network user behavior and installed patches.
Multi-Factor Threat Detection – Effectively enabling real-time search for information like vulnerabilities, active services, dangerous files, and known malicious hashes in a non-intrusive manner.
Maximum Control – Enables better network policy development and monitoring using queries and rules in conjunction with internal operations or industry regulations.
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks