Visibility Over Your Industrial Infrastructure
To secure your infrastructure, you must know it well. ICS CyberVision maintains a complete inventory of your industrial assets, maps communication flows and identifies equipment vulnerabilities
Your production infrastructure has changed over the years. Do you have an up-to-date inventory of the equipment deployed? Do you know its hardware and software features? Do you know which equipment provides remote access and to whom? Do you have an idea of the flows it generates on your network and what it communicates with?
ICS CyberVision automatically maps your industrial equipment and communication flows to give you a detailed inventory. You can graphically display your devices, their relationships, their vulnerabilities, and the programs they run. You now have perfect knowledge of the situation to patch vulnerabilities, segment your network and reduce your attack surface.
Sentryo's Deep Packet Inspection (DPI) identifies all your equipment and builds a map of your industrial network
ICS CyberVision automatically uncovers the smallest details of your production infrastructure: Vendor references, firmware and hardware versions, serial numbers, PLC rack slot configuration, etc. It identifies asset relationships, communication patterns, changes to variables and more. This wealth of information is shown in various types of maps, tables and reports that let you quickly spot the important information so you can drive actions.
Easy Situation Awarness
No need to be an expert in industrial protocols to analyze your network data and understand what's going on
ICS CyberVision translates the characteristics of equipment and network flows into tag, a universal language anyone can understand and which shows the business impact of each communication on your process, whatever the manufacturer and the protocol used. Tag-filtered views let you immediately find what you’re looking for and easily identify important information, even if you’re not expert in industrial protocols.
Keeping equipment up-to-date is a simple way to protect them. But you need a way to identify the available updates to apply them quickly.
ICS CyberVision compares the characteristics of each device to a knowledge base updated daily by researchers from the Sentryo Security Lab. You can immediately see the vulnerabilities of each device: software to be updated, remote access, default passwords, etc. You are guided as to what actions need to be taken. You become an active player in your security.