ICS/SCADA Cyber Security | ||||||||||||
Abnormal Behavior Detection | N/A | N/A | N/A | N/A | ||||||||
Traffic Analysis | N/A | N/A | N/A | N/A | N/A | |||||||
Security Orchestration | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Passive Monitoring | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Automated Asset Discovery | N/A | N/A | N/A | N/A | ||||||||
Flow Discovery | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
PLCs and RTUs Discovery | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Network Topology Mapping | N/A | Yes | Yes (Purdue Model) | Yes | N/A | Yes | Yes | N/A | Yes | Yes | Yes (Purdue Model) | N/A |
Inventory of Devices | N/A | N/A | N/A | N/A | ||||||||
View Filters | N/A | N/A | N/A | N/A | ||||||||
Forensic Investigations Support | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
Rogue Device Detection | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
Zero-Day Threats Detection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
Detecting Threats with Context | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Changes Monitoring | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Vulnerability Assessment Report | N/A | N/A | N/A | N/A | N/A | |||||||
ICS Threat Intelligence | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Deep-Packet Inspection (DPI) | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Zero Impact | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
Continuous Monitoring | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Network Segmentation | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
Port Mirroring | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Multi-site Deployment | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Agentless Deployment | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Mitigation of Security Events | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Data Historian Alerts | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Event Log | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
PLC Setting Modification | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Backup and Recovery | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Configuration Updates | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Perimeter Controls | N/A | N/A | ||||||||||
Integrations | N/A |
|
|
|
|
|
| N/A |
|
| N/A |
|
Supported Systems | N/A |
|
|
| N/A | N/A |
| N/A | N/A |
| N/A | N/A |
ICS/SCADA Cyber Security |
Abnormal Behavior Detection |
Traffic Analysis |
Security Orchestration |
Passive Monitoring |
Automated Asset Discovery |
Flow Discovery |
PLCs and RTUs Discovery |
Network Topology Mapping |
Inventory of Devices |
View Filters |
Forensic Investigations Support |
Rogue Device Detection |
Zero-Day Threats Detection |
Detecting Threats with Context |
Changes Monitoring |
Vulnerability Assessment Report |
ICS Threat Intelligence |
Deep-Packet Inspection (DPI) |
Zero Impact |
Continuous Monitoring |
Network Segmentation |
Port Mirroring |
Multi-site Deployment |
Agentless Deployment |
Mitigation of Security Events |
Data Historian Alerts |
Event Log |
PLC Setting Modification |
Backup and Recovery |
Configuration Updates |
Perimeter Controls |
Integrations |
Supported Systems |