ICS/SCADA Cyber Security
Abnormal Behavior Detection
AvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableN/AN/A
Traffic Analysis
N/AN/AAvaliableAvaliableN/AN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/A
Security Orchestration
N/AN/AAvaliableN/AAvaliableN/AAvaliableN/AN/AN/AAvaliableN/A
Passive Monitoring
N/AN/AAvaliableN/AAvaliableN/AAvaliableN/AAvaliableN/AN/AN/A
Automated Asset Discovery
AvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AN/A
Flow Discovery
AvaliableN/AN/AAvaliableN/AN/AN/AN/AN/AN/AN/AN/A
PLCs and RTUs Discovery
N/AN/AAvaliableAvaliableN/AN/AAvaliableAvaliableN/AN/AAvaliableN/A
Network Topology Mapping
N/AYesYes (Purdue Model)YesN/AYesYesN/AYesYesYes (Purdue Model)N/A
Inventory of Devices
N/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AN/A
View Filters
N/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AN/A
Forensic Investigations Support
N/AAvaliableAvaliableAvaliableN/AN/AAvaliableAvaliableAvaliableN/AN/AN/A
Rogue Device Detection
N/AN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AN/AN/A
Zero-Day Threats Detection
N/AN/AAvaliableN/AN/AN/AAvaliableN/AAvaliableN/AN/AN/A
Detecting Threats with Context
N/AAvaliableAvaliableAvaliableAvaliableN/AN/AN/AAvaliableN/AN/AN/A
Changes Monitoring
N/AAvaliableN/AAvaliableN/AAvaliableAvaliableN/AAvaliableN/AN/AN/A
Vulnerability Assessment Report
N/AN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AN/A
ICS Threat Intelligence
N/AN/AAvaliableAvaliableN/AN/AAvaliableAvaliableN/AAvaliableN/AN/A
Deep-Packet Inspection (DPI)
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AN/AAvaliableN/AN/A
Zero Impact
N/AN/AAvaliableN/AN/AAvaliableAvaliableN/AN/AN/AN/AN/A
Continuous Monitoring
N/AAvaliableAvaliableN/AN/AN/AAvaliableN/AN/AAvaliableN/AN/A
Network Segmentation
N/AN/AN/AN/AAvaliableN/AN/AN/AAvaliableN/AAvaliableN/A
Port Mirroring
N/AN/AAvaliableAvaliableN/AN/AAvaliableN/AN/AAvaliableN/AN/A
Multi-site Deployment
N/AAvaliableAvaliableN/AAvaliableN/AAvaliableN/AAvaliableN/AN/AN/A
Agentless Deployment
N/AN/AN/AN/AAvaliableN/AAvaliableN/AN/AN/AN/AN/A
Mitigation of Security Events
N/AN/AAvaliableN/AAvaliableN/AAvaliableN/AAvaliableN/AN/AN/A
Data Historian Alerts
N/AN/AAvaliableAvaliableN/AN/AAvaliableN/AAvaliableN/AN/AAvaliable
Event Log
N/AAvaliableN/AAvaliableN/AN/AAvaliableN/AN/AN/AN/AN/A
PLC Setting Modification
N/AAvaliableN/AN/AN/AN/AAvaliableN/AN/AN/AN/AN/A
Backup and Recovery
N/AN/AAvaliableN/AN/AN/AAvaliableN/AN/AN/AN/AN/A
Configuration Updates
N/AAvaliableAvaliableN/AAvaliableN/AAvaliableN/AAvaliableN/AN/AN/A
Perimeter Controls
AvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Integrations
N/A
  • SIEM
  • SOC
  • Firewall
  • CMDB
  • IDS/IPS
  • SIEM
  • SOC
  • SIEM
  • CMDB
  • Firewall
  • CMDB
  • SIEM
  • SOC
  • CMDB
  • SIEM
N/A
  • IT/OT
  • SOC
  • SIEM
N/A
  • IT/OT
Supported Systems
N/A
  • HMI
  • PLC
  • DCS
  • PLC
  • RTU
  • DCS
  • PLC
N/AN/A
  • DCS
  • PAC
  • PLC
  • RTU
N/AN/A
  • HMI
  • PLC
N/AN/A
ICS/SCADA Cyber Security
Abnormal Behavior Detection
Traffic Analysis
Security Orchestration
Passive Monitoring
Automated Asset Discovery
Flow Discovery
PLCs and RTUs Discovery
Network Topology Mapping
Inventory of Devices
View Filters
Forensic Investigations Support
Rogue Device Detection
Zero-Day Threats Detection
Detecting Threats with Context
Changes Monitoring
Vulnerability Assessment Report
ICS Threat Intelligence
Deep-Packet Inspection (DPI)
Zero Impact
Continuous Monitoring
Network Segmentation
Port Mirroring
Multi-site Deployment
Agentless Deployment
Mitigation of Security Events
Data Historian Alerts
Event Log
PLC Setting Modification
Backup and Recovery
Configuration Updates
Perimeter Controls
Integrations
Supported Systems