Alexa

10 Fastest Growing IOT Solution Providers 2018

The Simplest and Most Complete Critical Infrastructure Cybersecurity Solution: CyberX

thesiliconreview-omer-schneider-ceo-cyberx-18

Critical infrastructure and other industrial organizations still rely on ICS and SCADA systems that were designed decades ago, lacking most of the security controls it now takes for granted in enterprise IT networks.

As IT and OT networks converge to support IIoT initiatives such as Smart Manufacturing and SmartGrid, CyberX can no longer rely on perimeter firewalls and other legacy defenses that weren’t designed to address targeted threats, zero-day exploits, and careless or malicious insiders.

CyberX provides the most widely-deployed industrial cybersecurity platform for continuous, non-invasive risk assessment and M2M anomaly detection. Its purpose-built platform enables organizations to detect and respond faster to risk in their industrial networks. Recognized by Gartner as a “Cool Vendor,” CyberX is the only ICS security vendor selected for the SINET16 Innovator Award sponsored by the US DHS and DoD.

Supporting all industrial protocols, CyberX’s technology is rapidly deployed with zero impact on operations, integrating via REST APIs with all HMIs and SIEMs. CyberX uses patent-pending M2M behavioral analytics to model ICS networks as deterministic sequences of states and transitions, a technique known as finite state modeling (FSM). Combined with other analytics and proprietary ICS threat intelligence, this enables rapid detection of industrial malware such as BlackEnergy and Havex, and vulnerabilities such as unauthorized remote access and device misconfigurations.

CyberX was founded by Omer Schneider and Nir Giller, both veterans of an elite IDF cybersecurity unit charged with securing their country’s national critical infrastructure. With deep domain expertise and practical real-world experience with OT networks, it has engineered the platform to quickly deliver practical insights to ICS security and operations teams. CyberX’s deployments currently span diverse industrial sectors including energy, manufacturing, electric utilities, water, oil & gas, chemicals, pharmaceuticals, and transportation.

CyberX is backed by Norwest Venture Partners, Glilot Capital, Swarth Group, GlenRock Israel, Flint Capital, its crowd and angel investors Gigi Levy and Stan Chudnovsky.

The CyberX Platform

Combining continuous ICS network monitoring with ICS-aware anomaly detection and threat intelligence, the CyberX platform rapidly detects both cyber and operational incidents to strengthen operational resiliency for industrial and critical infrastructure organizations worldwide.

  • Continuous, non-invasive asset discovery and risk assessments to identify ICS/SCADA vulnerabilities such as unauthorized remote connections, insecure devices, weak authentication, and weak segmentation
  • Complete situational awareness of malware and targeted threats to critical infrastructure such as unauthorized PLC changes; PLC Stop commands; scanning malware indicating reconnaissance operations using ICS protocols; protocol violations indicating attempts to exploit known vulnerabilities
  • Agentless technology that delivers accurate insights in less than an hour and has zero impact on the OT network. Uses machine learning to eliminate the need for rules or signatures. Supports any ICS vendor, industrial protocol & SIEM

How does CyberX protect my ICS/SCADA network?

The CyberX platform continuously monitors your ICS/SCADA network for threats and vulnerabilities — delivering alerts and insights that your OT team can easily consume and act upon.

Actionable intelligence with recommended mitigations, not just alerts. Maintenance outages are precious its automated ICS threat modeling prioritizes remediation to protect your most critical assets from the most likely attack vectors, ranked by risk.

Trusted Industrial Cybersecurity

Successful cyberattack — such as the WannaCry and NotPetya ransomware infestations that halted production operations worldwide; the Ukrainian power grid attacks in 2015 and 2016; and the destruction of a German steel mill in 2015 — are real-world examples of cyber incidents that have had major consequences on cyber-physical systems.

According to the ICS-CERT, sophisticated malware has been compromising its ICS environments since 2011. In fact, most incidents are never reported because the majority of organizations lack the technology and personnel to detect intrusions when they happen. CyberX provides the most widely-deployed industrial cybersecurity platform for continuously reducing ICS risk. CyberX works with organizations across all industry verticals to enable faster detection and response to ICS/SCADA threats including:

  • Industrial malware
  • Targeted attacks
  • Insider threats
  • Vulnerable assets and networks
  • Operational malfunctions

Unlike IT security tools, its OT-specific security platform:

  • Leverages a deep understanding of industrial protocols (DNP3, IEC61850, S7, OPC, etc.)
  • Incorporates ICS-specific behavioral analytics and threat intelligence — for faster anomaly detection with fewer false positives
  • Provides ICS-specific asset discovery and vulnerability management supporting diverse vendors (Rockwell Automation, Schneider Electric, Siemens, GE, etc.)
  • Uses agentless, non-invasive technology with zero impact on your production network; integrates seamlessly with your existing SIEM and other security systems, and is easily deployed as either a virtual or physical appliance

The Leader

Omer Schneider, CEO and Co-founder: Prior to founding CyberX, Omer Schneider led an elite Israel Defense Forces (IDF) cybersecurity unit tasked with protecting critical infrastructure, where he headed cybersecurity operations and R&D. He was also invited to be a member of Israel’s national cybersecurity initiative and is a contributing member of the Industrial Internet Consortium (IIC). He holds a BSc. in Computer Engineering from the Technion Institute and an MBA degree from Tel Aviv University Business School.

“Our technology enables organizations to continue with their operations, knowing that their OT Network is secure and stable.”