Your one-stop web resource providing safety and security information to manufacturers

In an effort to help prevent a cybersecurity breach, industrial companies globally can now manage cyber risk in their operations using the Rockwell Automation Threat Detection Services.

Rockwell Automation expanded the services globally to help more companies combat the unknown nature of today’s evolving industrial cybersecurity threats.

RELATED STORIES
TCSS Signs OT MSSP Partner Pact
Indegy offers Gratis Network Health Check
Cisco Deals for ICS Network Monitoring Firm
FireEye Deals for VA Security Provider

“A scary aspect of security threats is what you don’t know about them – what techniques they’ll use, what attack vector they’ll leverage, what vulnerabilities they’ll exploit,” said Umair Masud, manager security services portfolio at Rockwell Automation. “Our Threat Detection Services combine our innate understanding of industrial automation with Claroty’s trusted OT network visibility. The services can give companies peace of mind by protecting not only one facility but their entire supply chain from unpredictable threats.”

The Threat Detection Services help safeguard connected operations in three key ways:
Identify and Protect: Identifying all industrial control networked assets, and their vulnerabilities, to help companies know what to protect
Detect: Monitoring networks for not only known threats but, more importantly, anomalous traffic or behaviors to alert companies of a security incident
Response and Recovery: Developing plans for containing, eradicating and recovering from attacks to keep operations running or more quickly return to a fully operational state

Cyber Security

Companies that have used Threat Detection Services have also discovered operational benefits. For example, collected asset data can help uncover risks like obsolete technology, outdated firmware and spare parts shortages.

The Claroty threat detection platform creates an inventory of a user’s industrial network assets, monitors traffic between them and analyzes communications at their deepest level. Detected anomalies are reported to plant and security personnel with actionable insights.

Pin It on Pinterest

Share This