For VendorsBlog
iSID Industrial Threat Detection

iSID Industrial Threat Detection

Threat and vulnerability detection with system-wide visibility for ICS/SCADA OT networks.

Features of product

Проблемы Problem Solving
  • Aging IT infrastructure
  • No IT security guidelines
  • Unauthorized access to corporate IT systems and data
  • Risk or Leaks of confidential information
  • Risk of attacks by hackers
  • Risk of lost access to data and IT systems
Ценности Business Values
  • Ensure Security and Business Continuity

About Product

Radiflow’s iSID Detection & Analysis Platform provides proactive cybersecurity for critical infrastructures through non-intrusive monitoring of distributed production networks for changes in topology and behavior.

iSID’s multiple security engines offer capabilities pertaining to specific type of network activity: modeling and visibility of OT and IT devices, protocols and sessions; detection of threats and attacks; policy monitoring and validation of operational parameters; rules-based maintenance management; and networked device management.
iSID employs Radiflow’s iSAP Smart Collectors, installed at distributed networks’ remote sites, to collect, compress (to prevent network overload) and send over GRE all LAN traffic from the local switch, using port mirroring to a centrally installed iSID over VPN tunnels.

iSID allows for different modes of deployment, allowing organizations to optimize their cyber-security expenditure: on-site at the industrial (ICS/SCADA-based) facility; at the operator’s central monitoring location; or at an MSSP’s SOC (Security Operations center) using the iCEN management platform for multiple instances of iSID.

Features of users

Продающие истории Use Cases

Radiflow Incorporates Dynamic Vulnerability Assessment Scoring into its Industrial Threat Detection Solution

Продающия история

Radiflow, a leading provider of industrial cybersecurity solutions for industrial automation networks, announced that the company has added dynamic vulnerability assessment scoring capabilities in the new release of its iSID industrial threat detection solution.

The current practices for risk assessments and security remediations employed by industrial enterprises and critical infrastructure operators generally rely on manual evaluations and follow unstructured processes. These processes are often time consuming and are not sufficiently responsive to changes in the threat and vulnerability landscape.
Read more:

Work flow chart