New cybersecurity solution from Tripwire is intended to protect connected industrial systems which are becoming more and more vulnerable to cyber attacks. Called ‘ICS Cyber Resiliency Suite’, the solution is designed to mitigate cyber risk for operational technology (OT) environments in industries such as utilities and manufacturing to drive availability, safety and resilience.
Leveraging the solution, industrial operators can gain a better understanding of their cyber risks as well as the insight needed to minimize and effectively monitor their attack surface. Because this cybersecurity solution can be integrated with a wide variety of systems, both the workload and complexity of managing ICS security, resilience and regulatory compliance are reduced, according to the company.
The solution provides secure configuration management (SCM), vulnerability management (VM) and log management (LM) capabilities purpose-built for industrial use cases.
It offers the industry no-touch security configuration and vulnerability assessment capabilities that can operate within ICS levels without disrupting controller function, and can monitor a full range of ICS devices and system manufacturers.
The solution allows users to easily prove compliance by checking configurations against established industry standards and best practices.
“When it comes to critical infrastructure, cyber threats can lead not only to data and financial loss, but also to severe physical consequences like operational shutdown and physical harm,” said Tim Erlin, vice president of product management and strategy at Tripwire. “We developed the Tripwire ICS Cyber Resiliency Suite to help operators build stronger security and resilience in their operating environments while also supporting requirements for production availability and operational excellence. These solutions provide operators with a comprehensive approach for maintaining secure and compliant postures across multiple ICS layers, components and suppliers.”
Security capabilities include:
- Asset discovery – physical and virtual.
- Continuous change monitoring and incident detection.
- Device and system log data collection and event correlation.
- A no-touch approach security assessment for ICS and industrial devices.
- Configuration assessment and hardening.
- Built-in industrial best practices standards and guidance.
- Vulnerability assessment.
- Industrial dashboards and reporting.
- Integrations with leading factory automation systems for workflow efficiency.