BOSTON, Nov. 08, 2018 (GLOBE NEWSWIRE) -- CyberX, the IIoT and industrial control system (ICS) security company, today announced its industrial cybersecurity platform was used by NIST to recommend new ways of securing manufacturing industrial control systems.
Developed by NIST’s National Cybersecurity Center of Excellence (NCCoE), a newly released report shows how technologies like CyberX enable manufacturing organizations to reduce the risk of disruptive cyberattacks like NotPetya and WannaCry, enable faster incident response and shorter downtimes, and deliver real-time visibility and monitoring of ICS assets and networks.
CyberX uses agentless Network Traffic Analysis (NTA) with patented self-learning to continuously monitor ICS network traffic for anomalies without impacting performance. Alerts are forwarded to standard SIEMs for investigation by the corporate SOC. NIST specifically tested detection of zero-day threats that would not normally be detected by traditional security tools like IDS/IPS systems that rely on predefined signatures.
Examples of anomalies detected by CyberX and documented in the NIST report include:
- Unauthorized devices attached to the ICS network
- Unauthorized remote access to the ICS network
- Network scans using ICS protocols, indicating potential cyber reconnaissance activities
- Unauthorized PLC logic downloads and file transfers between ICS devices
- Communication using undefined function codes in ICS protocols, which may indicate attempts to exploit known vulnerabilities in ICS devices
The report was the product of a close collaboration between the NCCoE, CyberX, and other technology providers such as OSIsoft. It presents detailed findings and a reference architecture that organizations can use for their own environments.
Mapping to NIST Cybersecurity Framework (CSF)
The NIST report documents the use of behavioral anomaly detection (BAD) in two distinct environments: a robotics-based manufacturing system, and a process control system similar to those used in chemical and pharmaceutical manufacturing. In addition, the report maps the security characteristics of BAD to the NIST Cybersecurity Framework (CSF), a practical standard for operationalizing controls based on business objectives.
Certain commercial entities, equipment, products, or materials may be identified in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the entities, equipment, products, or materials are necessarily the best available for the purpose.
About CyberX
CyberX delivers the only industrial cybersecurity platform built by blue-team military cyber-experts with nation-state expertise defending critical infrastructure. That difference is the foundation for the most widely-deployed platform for continuously reducing ICS risk and preventing costly production outages, safety failures, and environmental incidents.
Notable CyberX customers include 2 of the top 5 US energy providers; a top 5 US chemical company; a top 5 global pharmaceutical company; and national electric and gas utilities across Europe and Asia-Pacific. Strategic partners include industry leaders such as Palo Alto Networks, IBM Security, Splunk, Optiv Security, DXC Technologies, and Deutsche-Telekom/T-Systems. For more information visit CyberX-Labs.com or follow @CyberX_Labs.
Media Contact
Deb Montner
Montner Tech PR
203-984-7861
dmontner@montner.com