Secure-NOK

Company Description:

Traditional cybersecurity protection methods are not tailored for industrial settings and might allow advanced threats to go undetected. That is why we have designed SNOK™ to specifically meet the needs of owners of industrial automation and control systems. The modularity of our technology ensures that it can be installed in the hidden corners, on all types of assets, ensuring there are no blindspots in your systems.

Related Topics:

Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


RAD

Company Description:

The RAD Group is a family of independent companies that develop, manufacture and market solutions for diverse segments of the networking and telecommunications industry. RAD’s Service Assured Networking solutions with built-in security ensure that your operational network remains reliable and protected at all times.

Related Topics:

Communications Systems; Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


ProtectWise

Company Description:

ProtectWise™ provides Cloud-Powered Network Detection and Response (NDR). Organizations can achieve defense-in-depth via advanced analytics on cloud, hybrid and enterprise traffic with real time and retrospective detections. Full-fidelity packet captures, indexed and retained indefinitely, create a perfect, rapidly searchable network memory. Analytics and forensics unified in an intuitive and immersive visualizer enable rapid and more effective incident response and threat hunting.

Founded in April 2013, ProtectWise is based in Denver and led by a team of security and SaaS industry veterans from McAfee, Palo Alto Networks, and Symantec. The company launched the Immersive Security movement in 2017 to build a new path forward for the security industry. ProtectWise has raised more than $70 million in funding.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Nozomi Networks

Company Description:

We empower digital transformation by pioneering innovation for industrial cyber security and operational control. Cyber security and rich operational insight are crucial to optimizing industrial processes and quickly delivering new business value. Nozomi Networks makes it possible to address escalating cyber risks while delivering insights that continuously improve cyber-physical processes.

Related Topics:

Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Fidelis Security

Company Description:

At Fidelis Cybersecurity, we are committed to helping our customers detect and respond to the advanced threats of today and tomorrow, with powerful technology solutions and services that provide security professionals with the accuracy and context to make faster, more informed decisions. Through Fidelis ElevateTM, we provide one unified platform that ensures faster detection, empowers threat hunting and automates response, providing accuracy, clarity and certainty for your cyber security team.

Related Topics:

Real-Time Operational Technology Network Analysis and Security; Endpoint Detection & Response


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


CyGlass

Company Description:

CyGlass is an affordable, advanced threat detection solution built for Small and Medium Businesses and the service providers that support them. CyGlass is a Software as a Service application that identifies, detects and responds to network-based cyber attacks in real-time by leveraging our advanced layered Artificial Intelligence approach. Using an ensemble of algorithms, CyGlass learns the customer’s network and can detect threats of unknown origin. CyGlass also provides policy assurance for audit and compliance purpose.

Related Topics:

Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Centripetal Networks

Company Description:

Internet-connected devices contain a variety of vulnerabilities and security risks – especially since they are a targeted entry point into critical infrastructure (OT/ICS) that contains SCADA and IoT systems and other internal networks. IoT devices have physical limitations due to a small footprint which results in a lack of security.

As the number of connected devices increases, so do the security threats by way of entry points that can include partner/supply chain communication into the network which broadens the attack surface and increases attack vectors. This enables hackers to exploit the vulnerabilities in the system, and in many cases quite easily. There have been several high-profile breaches that have been the result of network infiltration through SCADA and IoT devices.

Nation-state hackers and hacktivism actors regard critical infrastructure in government agencies, municipalities, industrial facilities and businesses as high-value targets. Applying shielding against known threats is a highly effective part of the kill chain and prevents network infiltration and data exfiltration.

Centripetal CleanINTERNET is used by several customers to protect their valuable IT, OT/ICS and SCADA assets. Centripetal’s elite cyberthreat analyst team has identified the following vulnerabilities within critical infrastructure:

  • Verified and delivered contextual threat data and nation-state attribution.
  • Delivered attribution information to LEAs relating to nation-state activity that resulted in network infiltration within government agencies and critical infrastructure facilities. Identified hosts that have established C&C communications in targeted networks that resulted in sensitive data exfiltration.
  • Provided timelines and data of malicious activities.

Related Topics:

Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Bayshore Networks

Company Description:

Bayshore empowers organizations to turn their passion for safe and efficient production – and business continuity – into power operational insights and improved business outcomes. Bayshore offers custom, off-the-shelf cyber protection solutions for most industrial use cases.

Related Topics:

Privileged Identify/Access Management; Privileged Remote Access Solutions; Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Armis

Company Description:

Armis’ mission is to enable enterprises to adopt new connected devices without fear of compromise by cyber attack. They provide solutions for the following industries: Enterprise, healthcare, manufacturing/OT, finance, retail and smart cities.

Related Topics:

Monitoring – Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


SecureLink

Company Description:

At SecureLink, we do one thing – and we do it well. In 2003, we launched a software platform to provide secure, accountable, and auditable third-party remote access. Since then, we have helped more than 31,000 organizations ensure their data is secure during tens of millions of support sessions.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.