For a limited time, Radiflow, in partnership with Vysiion, offers webinar participants a free security assessment for their OT networks.

An effective ICS/SCADA protection plan requires comprehensive identification and mapping of all devices, connections, ports and other network assets, in order to detect vulnerabilities and exposures and assess them in terms of severity and potential impact if compromised.

Radiflow now offers participants of its Vysiion-partnered webinar a free, non-disruptive assessment of their ICS networks for vulnerabilities and threats to industrial applications

Radiflow’s assessment procedure is performed by our top security experts. It employs the most up-to-date methodologies and is based on the company’s next-generation iRISK Industrial Risk Analytics solution. Upon completion of the assessment, the customer is presented with a detailed report that includes all the information collected and logged, the findings resulting from the analysis, and a comprehensive cybersecurity plan of the organization.

Eligibility subject to pre-qualification. 


Expertise & Technology

Performed by Radiflow’s cyber-security experts using the iRISK Industrial Risk Analytics solution.


Non-intrusive network traffic recording, with no interruption to ongoing production (OT) operations

Full Visualization

Clear, drill-down visualization of the OT network topology including all connected assets

Threat & vulnerability detection

Detection of all known SCADA-specific threats, logical changes in PLCs & open remote SSH sessions


Entire process is structured and standards-based, e.g. ISA/IEC-62443 (Formerly ISA-99)

Reporting & Mitigation

Upon completion the user is provided with a detailed threat and vulnerability report and mitigation roadmap


Radiflow’s iRISK Industrial Risk Analytics Platform provides the actual impact of the introduced risk, which can be quantified either monetarily or based on its health, environment and safety (HSE) effects. Offered as a cloud service, the iRISK analytics process can be done either continually or on an ad-hoc basis, without the need for on-site permanent deployment. 

Applying a unique quantitative (data-driven) approach (rather than a human-qualitative approach one), iRISK weights the network’s digital production (asset, protocols, etc.) image and business process prioritization from Radiflow’s iSID, based on the likelihood of a risk materializing, on historical IT & OT protocol attack data (used as benchmarks for similar networks), and on IT & OT vulnerability data (CVSS).

The weighted data is used to run network-wide attack simulations and inter-asset attack vectors. The ultimate result is a comprehensive real-world assessment report, as well as risk prioritization and recommendations for mitigation.

iRISK combines network and business process information from iSID with research data to provide an accurate, real-world risk assessment


iRISK’s automatically generates a full risk-status report, detailing network properties, overall risk score, extent of risk introduced by devices and protocols, likelihood of lateral threat movement between business processes, potential attack paths and more. The process is triggered automatically each time a change is detected on the network.

In addition, iRISK provides applicable remediation recommendations according to NIST guidelines, specifying which corrective actions improve network’s security posture.

For example, iRISK would recommend that the operator segment the network or allow only firewalled access to certain assets, which eliminate several attack vector exploits and improve the cyber risk score by a certain amount.