Cybersecurity provider, Radiflow, and Trusted Cyber Security Solutions (TCSS) inked a deal where TCSS joined Radiflow’s OT MSSP Partner program in order to expand its service offerings and pursue market opportunities to provide managed OT cybersecurity services to its industrial customers across central and southern Europe.
TCSS is a cybersecurity systems integration and consulting firm based in Vienna, Austria. The company provides a range of IT-related cybersecurity solutions, including consulting, professional and managed services, to its corporate and government customers through the DACH, Balkan and Adriatic regions in Europe.
TCSS has experienced significant growth in the industrial enterprise segment. As part of an overall effort to expand its service offerings for this customer segment, TCSS launched OT managed cybersecurity services based on Radiflow’s OT MSSP partner program.
“Most of our industrial enterprise customers are in the process of digitizing their operations, which has created a valuable market opportunity for our company to provide ongoing OT cybersecurity services in an MSSP offering,” said Robert Herscovici, chief executive at TCSS. “Radiflow’s comprehensive MSSP partner program will provide us with the framework to rapidly define and rollout important new managed OT cybersecurity services to protect our industrial enterprise customers throughout their Industry 4.0 journeys.”
Radiflow’s OT MSSP partner program provides tools, procedures and expertise for MSSPs to rollout new cybersecurity services dedicated to the ICS/SCADA networks of their industrial enterprise and critical infrastructure customers. By hosting Radiflow’s iSID Industrial Threat Detection System in its cloud environment, an MSSP can offer new OT cybersecurity services, including mapping and monitoring the network topology and connected assets, detecting and responding to security breach alerts and more.
MSSPs can also offer advanced OT cybersecurity services that leverage iSID’s automated vulnerability mapping and dynamic scoring processes in order to identify the most critical security risks based on the impact to its specific business operations.