Security Monitoring for Industrial Applications
A new asset risk framework from Forescout Technologies allows organisations to aggregate and prioritise threats to operational technology (OT) and Industrial Internet of Things (IIoT) devices.
SilentDefense provides users with intuitive, impact-based scores in a central dashboard so they can determine their current security risk exposure, identify assets that have a high potential of being attacked and enable engineers to take action on the assets that need attention.
Network security monitoring tools create large amounts of information which can be very challenging for cybersecurity and operational stakeholders to review. By aggregating and prioritising operational and cyber security-based risk, real time decisions can be made quickly saving money and reducing probable issues to the networks.
According to Forescout, SilentDefense provides a “predictable and preventative form of risk analysis to lessen the exposure organisations face” by supporting the following capabilities:
- Active PLC Queries: Seamless process for cyber security analysts to create alert parameters so they can quickly set up custom compliance and monitoring directives so that no PLC/Controller can go unseen.
- Enhanced Compliance Reporting: Critical infrastructure managed by utility and energy organisations have compliance obligations when securing its networks. Forescout has now automated the compliance and reporting process for North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) compliance.
- FIPS Climpliancy: All government and federal organisations have to ensure they are Federal Information Processing Standards (FIPS) compliant. SilentDefense now includes tools and functions to allow these organisations to easily adhere to the security requirements of OT and ICS Networks of FIPS for implementing crypto algorithms, encryption schemes, handling important data, and working with various operating systems and hardware.
Damiano Bolzoni, Forescout’s vice-president of OT and industrial business, adds:
“The convergence of IT and OT networks and threats posed by the adoption of IIoT devices and services in the cloud has left enterprises more vulnerable than ever before.
“It is essential that organisations have access to real time data and visibility of its entire network so they can quickly understand their risk exposure and take preventative measures to mediate against the threats.”