Bridging the Gap Between IT and OT Network Security

Shannon Ragan Nov 14, 2016

Cyberattacks on systems managed by industrial control system (ICS) networks can have a catastrophic impact on safety, economies and critical services, which makes them a notorious and potentially lucrative target.

“From a technology perspective, these networks are especially attractive, which is why we’re seeing more attackers target them,” said Skybox VP of Products Ravid Circus. “The standard defenses IT networks rely on — next-generation firewalls, packet inspectors, intrusion prevention systems — don’t translate to these environments. Combined with their legacy technology, out-of-the-box settings and lackluster patching, this is a huge area for cyber risk.”

With network modeling, access simulation and vulnerability analysis, security professionals can unify cybersecurity management of IT and operational technology (OT) environments. Comprehensive attack surface modeling brings enhanced visibility to critical infrastructure deployments, enabling end-to-end access analysis from any source to any destination including virtualized networks and ICS devices. Vulnerability exposures can also be analyzed on the model using context-aware attack simulations which take into account existing security controls and known risks. This way, security teams can be sure to identify exposures anywhere in their IT or OT network and focus response on actually critical risk. These security management improvements mean increased uptime and reduced disruptions in critical infrastructure operations.

  • Skybox Joining Forces with CyberX

Skybox has launched an integration with the CyberX industrial internet security platform. Through the integration, Skybox will power complete visibility across industrial control systems (ICS), supervisory control and data acquisition (SCADA) and IT networks.

Read the technology brief and learn more about Skybox solutions for security in ICS and SCADA networks here.

The CyberX XSense platform models OT networks as a state machine. XSense uses continuous monitoring, real-time data collection and machine learning to detect unfamiliar activity to protect against cyberattacks and operational malfunction or tampering.

Integration with the Skybox® Security Suite pulls data from the XSense platform into a visual, interactive model of the attack surface. The model combines ICS and SCADA network data with information from a variety of sources including the Skybox® Vulnerability Database, threat intelligence feeds, security analysts, SIEMs and more. This provides comprehensive visibility and contextual intelligence for more accurate prioritization of cyber risks not just in the IT network, but across the entire organization.

“As the Industrial Internet and IT networks grow, the line between the two is disappearing fast, and attackers know it,” said CyberX CTO and Co-Founder Nir Giller. “With Skybox, we’re helping customers in industries such as energy, manufacturing, and oil and gas to ensure their security also bridges that gap. You need to be able to consolidate all of your connected assets and understand how the interrelationships impact risk. This integration makes that possible – and actually pretty easy.”

Shannon Ragan is the Senior Communications Manager at Skybox Security. Prior to joining Skybox, Ragan was a writer and editor in the legal and STEM fields. She has a passion for the changing world of cyber security and is a self-confessed news junkie. Ragan earned her BA in English at Webster University in St. Louis.

You May Also Be Interested In…

Sorry no articles found!

Recent Posts

Why Attacks on Critical Infrastructure are Increasing and How to Protect Against Them
Read More
Why We’re Going to See More Than 20,000 New Vulnerabilities in 2020
Read More
2020 Vulnerability and Threat Trends Report Mid-Year Update: Key Findings
Read More
Why Cybersecurity Investments Fail: The Pitfalls of ROI-Focused Strategies
Read More
Valak has a New Form: Why Businesses Should Fear Evolving Malware
Read More
Salt Vulnerabilities Exploited with Targeted Cryptomining Attack on DigiCert
Read More