Company Description:

Internet-connected devices contain a variety of vulnerabilities and security risks – especially since they are a targeted entry point into critical infrastructure (OT/ICS) that contains SCADA and IoT systems and other internal networks. IoT devices have physical limitations due to a small footprint which results in a lack of security.

As the number of connected devices increases, so do the security threats by way of entry points that can include partner/supply chain communication into the network which broadens the attack surface and increases attack vectors. This enables hackers to exploit the vulnerabilities in the system, and in many cases quite easily. There have been several high-profile breaches that have been the result of network infiltration through SCADA and IoT devices.

Nation-state hackers and hacktivism actors regard critical infrastructure in government agencies, municipalities, industrial facilities and businesses as high-value targets. Applying shielding against known threats is a highly effective part of the kill chain and prevents network infiltration and data exfiltration.

Centripetal CleanINTERNET is used by several customers to protect their valuable IT, OT/ICS and SCADA assets. Centripetal’s elite cyberthreat analyst team has identified the following vulnerabilities within critical infrastructure:

  • Verified and delivered contextual threat data and nation-state attribution.
  • Delivered attribution information to LEAs relating to nation-state activity that resulted in network infiltration within government agencies and critical infrastructure facilities. Identified hosts that have established C&C communications in targeted networks that resulted in sensitive data exfiltration.
  • Provided timelines and data of malicious activities.

Related Topics:

Real-Time Operational Technology Network Analysis and Security

Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.