With the network map, no assets or connections will be overlooked
Network map is created by following communication between assets with ICS Sight. Thus, no forgotten assets are left on the network, and the data flow is monitored live. In addition, business owners and managers are provided with a better understanding of the network in the infrastructure. In the event of a cyber attack, however, the malicious software used in the attack is detected by communication tracking and put into software quarantine for further investigation. For the attacks that are likely to occur in the future, the path that the attackers will follow is identified by making an attack simulation and necessary measures are taken accordingly.
Instant Communication Tracking
Communication between assets is followed in all its details. The protocols used, misconfigurations, faulty devices, open ports of assets and foreign interferences are detected immediately.
Graphical and Layered (Purdue) Mapping
As the continuation of the communication detection, the network is shown with both layers that based on the Purdue model and with the graphical interface. Thus, a better manageable network environment is provided by increasing visibility.
Attack Simulation and Incident Response
Attack vectors of malicious individuals are revealed by simulating an attack with a network map before cyber attacks occur. After the attack, the path followed and the malicious software used are examined.
You Can Browse Our Other Features
The rule engine which has strong cyber security rules that can detect thousands of harmful software and attack types, can be configured for the businesses with the rules that can be added by the user in a simple way.
The warning system, in which anomaly detection and detection anomalies are shown with the rule engine, is designed quite flexibly not only for cyber attacks with ready rules but also for detection of protocol and device-based anomalies.
The network map provides a lot of detailed information such as the location of the assets, communication between the assets, possible attack vectors and spoken protocols, as it shows the overall structure of the system.