Rockwell, Claroty Team on Security Offering

Wednesday, February 22, 2017 @ 02:02 PM gHale

Industrial security weaknesses are turning into actual attacks, to meet this need, industrial security software provider Claroty and Rockwell Automation are working together to combine security products and services into packaged security offerings.

Rockwell selected Claroty for the company’s anomaly-detection software. The software creates a detailed inventory of an end user’s industrial network assets, monitors traffic between those assets, and analyzes communications at their deepest level.

Detected anomalies end up reported to plant and security personnel with actionable insights to help enable efficient investigation, response and recovery.

“More connected control systems combined with the potential for more attacks on those systems have made cybersecurity a top concern in the industrial world,” said Scott Lapcewich, vice president and general manager, Customer Support and Maintenance at Rockwell. “Claroty’s deep-visibility software platform and expertise in industrial security made the company a natural fit for substantial collaboration as we grow our existing portfolio of security service and support offerings.”

A characteristic of the Claroty software is its ability to explore the deepest level of industrial network protocols without adversely impacting the system. This enables end users to identify even the smallest anomalies while protecting complex and sensitive industrial networks. Traditional IT security software often uses active queries and requires a footprint on the network, which can ultimately disrupt operations. The Claroty platform uses a passive-monitoring approach to inspect traffic without the risk of disruption.

“The Claroty platform can detect a bad actor’s activities at any stage, whether they’re trying to gain a foothold on a network, conduct reconnaissance or inflict damage,” said Amir Zilberstein, co-founder and chief executive of Claroty. “It also can detect human errors and other process integrity issues, which are often more common than threats from bad-actors. For example, the software monitors for critical asset changes that, if done incorrectly, could result in unexpected downtime. The system also identifies network-configuration issues that could expose a system to outside threats.”

Leave a Reply

You must be logged in to post a comment.