Empowers CISOs to increase the effectiveness of their risk-mitigation measures, while significantly reducing cybersecurity expenditure
Cybersecurity for OT just got better
The growing digitization in industrial automation applications introduces critical cybersecurity threats into traditional industrial applications. Such risks include targeted attacks on operational technology, or OT, as well as IT attacks that span into OT networks. These risks are especially critical to distributed SCADA networks that span multiple remote sites, where an attack can result in catastrophic disruption of national infrastructure services.
iSID-PA is an industrial threat detection app for the Palo Alto Networks’ Cortex Framework. The Cortex Framework enables organizations to quickly deploy new security capabilities without needing to provision additional hardware or software. It also offers a suite of APIs developers can use to connect innovative apps with rich data, threat intelligence and enforcement points. Organizations gain immediate security value from apps developed by an open ecosystem of trusted innovators.
The iSID-Cortex integration provides Cortex user with a host of new capabilities, including:
Radiflow iSID and Palo Alto Networks’ Cortex
Radifow iSID is a threat detection system for ICS/SCADA networks. The tool enables monitoring of industrial networks by mapping the IT and OT assets, and then providing situational awareness as well as real-time alerts on any behavioral anomalies.
iSID uses multiple security engines in parallel, each offering a unique capability. These engines detect potential anomalies, such as changes in network topology in the session used between devices, use of known exploits, deviations from predefined DPI policies of M2M sessions and changes in PLC configurations.
The Palo Alto Networks’® Cortex prevents successful cyberattacks through intelligent automation. Cortex combines network and endpoint security with threat intelligence and accurate analytics to help streamline routine tasks, automate protection and prevent cyber breaches.
Tight integrations across the platform and with ecosystem partners deliver consistent security across clouds, networks and mobile devices, natively providing the right capabilities at the right place across all stages of the attack lifecycle.
Use Cases
Use Case: Logic change in industrial controllers is not well protected.
Use Case: Up-to-date inventory information on industrial assets and their vulnerabilities is lacking.
Basic Elements and Data Flow