CyberX adds secure remote access integration for critical industrial networks
CyberX of Boston, MA announced on December 13 a new technology integration with CyberArk to provide secure remote access for critical industrial networks. CyberX is also a new member of the C3 Alliance, CyberArk’s global technology partner program.
ICS security is rapidly becoming a top-down priority for industrial and critical infrastructure organizations worldwide. Recent targeted attacks on energy companies such as Dragonfly 2.0 demonstrate that adversaries are seeking to access industrial networks using credentials stolen from privileged users such as control engineers and third-party maintenance personnel. This well-known approach — leveraging trusted remote connections such as VPNs to bypass network perimeter controls — was also used in the 2015 Ukrainian grid attack.
CyberX is the market leader in ICS and IIoT security with deployments across energy & utilities, oil & gas, manufacturing, pharmaceuticals, chemicals, nuclear and water. Since 2013, the company has leveraged its passive monitoring and proprietary Network Traffic Analysis (NTA) algorithms to assess ICS risk for more than 375 production ICS networks worldwide. Purpose-built for ICS security and developed by military cyber experts with nation-state experience defending critical infrastructure, the CyberX platform delivers continuous ICS threat monitoring and asset discovery, ICS threat intelligence, and non-invasive risk and vulnerability assessments.
The CyberArk solution offers a range of capabilities for securing privileged credentials and controlling remote access to critical assets such as SCADA workstations and Human Machine Interfaces (HMIs). The integration of CyberX’s continuous ICS monitoring platform with the CyberArk Privileged Account Security Solution enables industrial organizations to:
- Receive real-time alertswhenever CyberX detects remote sessions on the ICS network that were not authorized by the CyberArk solution. Additionally, the CyberX platform incorporates ICS-specific behavioral analytics and self-learning to immediately detect anomalous behavior indicating a potential breach of the OT network
- Continuously monitor and auditprivileged user sessions in the CyberX console, including which ICS devices are being accessed and whether the session is being recorded by CyberArk
- Perform incident response, threat hunting and threat modeling around remote access.To enable rapid breach response, SOC analysts can now query the CyberX event timeline to identify all remote sessions based on forensic details such as which remote access protocols were used (SSH, RDP, etc.) and whether sessions were authorized by CyberArk. Additionally, they can leverage CyberX’s exclusive automated threat modeling capability to proactively identify and secure multi-step attack chains that incorporate remote access connections to compromise critical assets
“Our mission is to reduce ICS risk by providing our customers with deep and continuous real-time visibility into all activity, threats and assets on their ICS networks,” said Omer Schneider, CEO and co-founder of CyberX. “By tightly integrating the CyberX platform with the market-leading CyberArk Privileged Account Security Solution, we’re significantly enhancing that visibility to reduce risk from one of the top attack vectors targeting industrial environments today.”
Source: CyberX