ICS/SCADA Cyber Security
Abnormal Behavior Detection
AvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableAvaliableAvaliableN/AN/A
Traffic Analysis
AvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/A
Security Orchestration
N/AN/AN/AAvaliableAvaliableN/AAvaliableN/AN/AN/AAvaliableN/A
Passive Monitoring
N/AN/AN/AAvaliableAvaliableN/AAvaliableN/AAvaliableN/AN/AN/A
Automated Asset Discovery
AvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AN/A
Flow Discovery
AvaliableAvaliableN/AN/AN/AN/AN/AN/AN/AN/AN/AN/A
PLCs and RTUs Discovery
AvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableN/AN/AAvaliableN/A
Network Topology Mapping
YesN/AYesYes (Purdue Model)N/AYesYesN/AYesYesYes (Purdue Model)N/A
Inventory of Devices
AvaliableN/AAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AN/A
View Filters
AvaliableN/AAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AN/A
Forensic Investigations Support
AvaliableN/AAvaliableAvaliableN/AN/AAvaliableAvaliableAvaliableN/AN/AN/A
Rogue Device Detection
AvaliableN/AN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableN/AN/AN/A
Zero-Day Threats Detection
N/AN/AN/AAvaliableN/AN/AAvaliableN/AAvaliableN/AN/AN/A
Detecting Threats with Context
AvaliableN/AAvaliableAvaliableAvaliableN/AN/AN/AAvaliableN/AN/AN/A
Changes Monitoring
AvaliableN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableN/AN/AN/A
Vulnerability Assessment Report
AvaliableN/AN/AAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableN/AN/A
ICS Threat Intelligence
AvaliableN/AN/AAvaliableN/AN/AAvaliableAvaliableN/AAvaliableN/AN/A
Deep-Packet Inspection (DPI)
AvaliableN/AN/AAvaliableAvaliableN/AAvaliableN/AN/AAvaliableN/AN/A
Zero Impact
N/AN/AN/AAvaliableN/AAvaliableAvaliableN/AN/AN/AN/AN/A
Continuous Monitoring
N/AN/AAvaliableAvaliableN/AN/AAvaliableN/AN/AAvaliableN/AN/A
Network Segmentation
N/AN/AN/AN/AAvaliableN/AN/AN/AAvaliableN/AAvaliableN/A
Port Mirroring
AvaliableN/AN/AAvaliableN/AN/AAvaliableN/AN/AAvaliableN/AN/A
Multi-site Deployment
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/AN/AN/A
Agentless Deployment
N/AN/AN/AN/AAvaliableN/AAvaliableN/AN/AN/AN/AN/A
Mitigation of Security Events
N/AN/AN/AAvaliableAvaliableN/AAvaliableN/AAvaliableN/AN/AN/A
Data Historian Alerts
AvaliableN/AN/AAvaliableN/AN/AAvaliableN/AAvaliableN/AN/AAvaliable
Event Log
AvaliableN/AAvaliableN/AN/AN/AAvaliableN/AN/AN/AN/AN/A
PLC Setting Modification
N/AN/AAvaliableN/AN/AN/AAvaliableN/AN/AN/AN/AN/A
Backup and Recovery
N/AN/AN/AAvaliableN/AN/AAvaliableN/AN/AN/AN/AN/A
Configuration Updates
N/AN/AAvaliableAvaliableAvaliableN/AAvaliableN/AAvaliableN/AN/AN/A
Perimeter Controls
AvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliable
Integrations
  • SIEM
N/A
  • SIEM
  • SOC
  • Firewall
  • CMDB
  • IDS/IPS
  • SIEM
  • SOC
  • CMDB
  • Firewall
  • CMDB
  • SIEM
  • SOC
  • CMDB
  • SIEM
N/A
  • IT/OT
  • SOC
  • SIEM
N/A
  • IT/OT
Supported Systems
  • DCS
  • PLC
N/A
  • HMI
  • PLC
  • DCS
  • PLC
  • RTU
N/AN/A
  • DCS
  • PAC
  • PLC
  • RTU
N/AN/A
  • HMI
  • PLC
N/AN/A
ICS/SCADA Cyber Security
Abnormal Behavior Detection
Traffic Analysis
Security Orchestration
Passive Monitoring
Automated Asset Discovery
Flow Discovery
PLCs and RTUs Discovery
Network Topology Mapping
Inventory of Devices
View Filters
Forensic Investigations Support
Rogue Device Detection
Zero-Day Threats Detection
Detecting Threats with Context
Changes Monitoring
Vulnerability Assessment Report
ICS Threat Intelligence
Deep-Packet Inspection (DPI)
Zero Impact
Continuous Monitoring
Network Segmentation
Port Mirroring
Multi-site Deployment
Agentless Deployment
Mitigation of Security Events
Data Historian Alerts
Event Log
PLC Setting Modification
Backup and Recovery
Configuration Updates
Perimeter Controls
Integrations
Supported Systems