CyberX Adds Secure Remote Access Integration for Critical Industrial Networks
New privileged account security integration reduces risk of unauthorized access to control networks.
December 14, 2017
PRESS RELEASE
BOSTON– CyberX, provider of the most widely-deployed industrial cybersecurity platform for continuously reducing industrial control system (ICS) risk, today announced a new technology integration with CyberArk, the global leader in privileged account security, to provide secure remote access for critical industrial networks. CyberX is also a new member of the C3 Alliance, CyberArk’s global technology partner program.
ICS security is rapidly becoming a top-down priority for industrial and critical infrastructure organizations worldwide. Recent targeted attacks on energy companies such as Dragonfly 2.0 demonstrate that adversaries are seeking to access industrial networks using credentials stolen from privileged users such as control engineers and third-party maintenance personnel. This well-known approach — leveraging trusted remote connections such as VPNs to bypass network perimeter controls — was also used in the 2015 Ukrainian grid attack.
CyberX is the market leader in ICS and IIoT security with deployments across energy & utilities, oil & gas, manufacturing, pharmaceuticals, chemicals, nuclear and water. Since 2013, the company has leveraged its passive monitoring and proprietary Network Traffic Analysis (NTA) algorithms to assess ICS risk for more than 375 production ICS networks worldwide. Purpose-built for ICS security and developed by military cyber experts with nation-state experience defending critical infrastructure, the CyberX platform delivers continuous ICS threat monitoring and asset discovery, ICS threat intelligence, and non-invasive risk and vulnerability assessments.
The CyberArk solution offers a wide range of capabilities for securing privileged credentials and controlling remote access to critical assets such as SCADA workstations and Human Machine Interfaces (HMIs). The integration of CyberX’s continuous ICS monitoring platform with the CyberArk Privileged Account Security Solution enables industrial organizations to:
· Receive real-time alerts whenever CyberX detects remote sessions on the ICS network that were not authorized by the CyberArk solution. Additionally, the CyberX platform incorporates ICS-specific behavioral analytics and self-learning to immediately detect anomalous behavior indicating a potential breach of the OT network
· Continuously monitor and audit privileged user sessions in the CyberX console, including which ICS devices are being accessed and whether the session is being recorded by CyberArk
· Perform incident response, threat hunting and threat modeling around remote access. To enable rapid breach response, SOC analysts can now query the CyberX event timeline to identify all remote sessions based on forensic details such as which remote access protocols were used (SSH, RDP, etc.) and whether sessions were authorized by CyberArk. Additionally, they can leverage CyberX’s exclusive automated threat modeling capability to proactively identify and secure multi-step attack chains that incorporate remote access connections to compromise critical assets
“Our mission is to reduce ICS risk by providing our customers with deep and continuous real-time visibility into all activity, threats and assets on their ICS networks,” said Omer Schneider, CEO and co-founder of CyberX. “By tightly integrating the CyberX platform with the market-leading CyberArk Privileged Account Security Solution, we’re significantly enhancing that visibility to reduce risk from one of the top attack vectors targeting industrial environments today.”
The CyberArk Privileged Account Security Solution is a complete solution to protect, monitor, alert and respond to privileged account-related risk. The proven platform offers a wide range of capabilities including the ability to secure and control access to privileged credentials and secrets based on policy; isolate, monitor and record privileged sessions; respond to anomalous privileged activity and halt in-progress attacks, and enforce least-privileged policies across all endpoints.
You May Also Like