Define: Control system security?
Industrial Control System (ICS) Cybersecurity is the prevention of interference with the proper operation of industrial automation and control systems. These control systems manage essential services including electricity, petroleum production, water, transportation, manufacturing, and communications. They rely on computers, networks, operating systems, applications, and programmable controllers, each of which could contain security vulnerabilities. The 2010 discovery of the Stuxnet worm demonstrated the vulnerability of these systems to cyber incidents. The United States and other governments have passed cyber-security regulations requiring enhanced protection for control systems operating critical infrastructure.
Top ICS Security Companies and Solutions
This article showcases Threat.Technology’s top picks for the best ICS Security solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Dragos is an industrial cybersecurity company on a mission to safeguard civilization by protecting the world’s critical infrastructure. Dragos codifies the knowledge of our cybersecurity experts into an integrated software platform that provides customers critical visibility into ICS and OT networks so that threats are identified and can be addressed before they become significant events.
Our solutions protect organizations across a range of industries, including power and water utilities, energy, and manufacturing, and are optimized for emerging applications like the Industrial Internet of Things (IIOT). Dragos is privately held and headquartered in the Washington, DC area with a regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East..
Nozomi Networks provides an industrial cybersecurity solution for real-time visibility to manage cyber risk and improve resilience for industrial operations. Customers gain advanced cybersecurity, improved operational reliability and IT/OT integration.
It supports over a quarter of a million devices in sectors such as critical infrastructure, energy, manufacturing, mining, transportation, and utilities, to tackle escalating cyber risks to operational networks (OT).. .
Attivo Networks provides required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Attivo Networks, the leader in deception technology, provides accurate in-network threat detection, analysis, and accelerated response to advanced, credential, insider, and ransomware attacks.
The Attivo Deception and Response Platform provide continuous visibility and efficient threat management for user networks, data centers, cloud, branch, IoT, ICS-SCADA, and POS environments. Camouflage dynamic deception sets high-interaction traps to misdirect and lure attackers into revealing themselves.
The solution’s advanced attack analysis and lateral movement tracking automate investigation, deliver evidence-based alerts, and in-depth forensic reports. Incident response is simplified with ThreatOps™ playbooks and 3rd party integrations for automated attack blocking, quarantine, and threat hunting..
Mission Secure®, an OT cybersecurity leader, is setting a new standard in OT cyber-protection stopping OT cyber threats head-on. The Mission Secure Platform backed by 24/7 Managed Services is the first to seamlessly integrate OT visibility, segmentation, protection, threat hunting, and incident response, delivering military strength, industrial grade OT protection.
With Mission Secure, customers keep critical operations up and running and safe from harm. Learn more at https://www.missionsecure.com..
PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide. Our ICS cybersecurity, Automation Asset Management, and Operations Management software and services support safe, secure, profitable, and compliant operations across the complex, heterogeneous, and proprietary process automation infrastructure.
Why do leading global industrial companies choose PAS over their DCS vendors for their ICS cybersecurity and alarm management? Platform independence. Our independence from automation vendor platforms offers our clients the most seamlessly integrated and unified solution for managing the variety of systems at their sites.
With more than 30 automation system brands and models within a typical enterprise, it is untenable to manage and protect the ICS layer from cyber threats and vulnerabilities. It is also expensive, inconsistent, and ineffective to manage the alarms within the different control systems with alarm management software offered by DCS vendors.
With PAS alarm management solutions, industrial companies have the assurance that their alarm systems perform optimally at the console level and deliver consistent KPIs at the management dashboard level.. .
Sentryo develops and provides cybersecurity and situation awareness solutions to industrial networks and the internet of things. Its solutions enable industrial engineers to prevent and detect cyberattacks.
The company allows corporations to ensure resilience and safety of the industrial operations by delivering continuous visibility over ICS and SCADA infrastructures and controlling the risks of cyber attacks. It works on smart cities, utilities, energy grids, and critical infrastructures that we people depend on.
Merged with IT technologies, it is the foundation of the upcoming Internet of Things where many different kind of smart devices will collaborate. It leverages AI algorithms to provide comprehensive visibility on the industrial assets so it can address vulnerabilities and detect anomalies in real time and work with IT to fight cyber-attacks.
Laurent Hausermann and Thierry Rouquet founded Sentryo on July 10, 2014. It has its headquarters in Charbonnières-les-Bains in France..
NexDefense is empowering control system professionals with a suite of pro-active cyber security technology products and services specifically designed for Industrial Control Systems (ICS). Through Integrity™, engineers, security and control system operators can covertly maintain direct visibility, insight and awareness over risks to the resiliency of engineered networks without sacrificing productivity or performance.
As the global leader, the NexDefense Integrity™ product suite can be found in utilities, oil & gas, defense, manufacturing, mining, chemicals and pharmaceuticals, water and wastewater, and transportation industries. In October 2013, the Battelle Energy Alliance (BEA) signed a Patent and Copyright License giving NexDefense exclusive rights to commercialize its Sophia software.
Integrity™ is the next evolution of Sophia, which improves industrial production, safety, and cyber security by identifying and optimizing design flaws and misconfigurations, in addition to human errors, system failures and malicious activities.. .
SecurityGate provides an integrated risk management platform designed specifically for operational technology (OT)/industrial control system (ICS) cybersecurity. The Software as a Service (SaaS) platform gives company leaders, governance risk and compliance departments, and IT teams unmatched visibility into OT/ICS environments.
The system uses intelligent systems to help CISOs understand business risk and build a strategy to mitigate the risk of cyber threats. Risk management teams use the platform to automate processes and speed up the time it typically takes to implement the prescribed tactics.
The company recently signed on Chevron, who joined ranks with other SecurityGate.io customers like Patterson UTI and Westlake Chemical.. .
aDolus Technology Inc.
aDolus provides a cloud platform to safeguard critical infrastructure, brokering information about ICS and IoT software and firmware. There is a $13 billion dollar industry for protecting PC endpoints, but there’s no similar ecosystem for protecting the smart devices used in industries such as energy, medical, and transportation.
Multiple vendors, platforms, and geographic locations make the problem complex, yet growing threats to systems and human safety make the need for a solution urgent. Regulation is accelerating this need.
With over 50 billion devices connected to the internet, the security market for IoT is projected to reach $74 billion by 2026. This creates a massive opportunity to help critical sectors secure their smart devices.
We estimate the annual TAM to be $920 million for the industrial sector alone. The medical, transportation, automotive, and defense sectors present further opportunities.aDolus is the first to market with a solution to analyze and authenticate device software.
Early momentum and deep industry ties have yielded a growing database of 32 million records. Our vendor-agnostic platform positions aDolus to capture this lucrative and under-served market..
Giant Gray builds multi-sensor, artificial cognitive neurolinguistics software that provides enhanced safety, security, and operational efficiency to businesses and government agencies across complex physical environments – from sprawling corporate campuses and remote oil and gas operations to ports and public transportation systems, and global enterprise networks of data. The patented, adaptive, and self-learning algorithms of Giant Gray technology “see” anomalies often hidden in oceans of data, bringing to light actionable insights with an intelligence that is anything but artificial.
In short, Giant Gray helps dramatically improve business operational awareness and incident response for its customers – as well as prevent costly interruptions and breakdowns – through its Graydient technology platform with applications in industrial (SCADA/ICS), physical security and surveillance, and cybersecurity environments. Most data analytics technology is challenging to deploy, expensive to use and maintain, confusing to understand, and limited to identifying known problems in a particular domain.
Giant Gray’s patented technology reduces costs and simplifies usage and maintenance by teaching itself from observing data – and it excels at detecting the unexpected and providing improved context by correlating various, disconnected data sources. These real-time insights allow customers to make operational adjustments before early-warning signals grow into true incidents that impact safety, security, and business operations.
Graydient stands apart from traditional analytics with its artificial cognitive neurolinguistics approach to machine learning, meaning it creates a custom language to describe the data from scratch and is not limited to primitive, baseline behavior models from the start. This is the Giant Gray difference.
We see it.. .
ROMAD Cyber Systems
Our name, ROMAD – RObust MAlware Defense, captures the essence of our innovative technology and unique capability. ROMAD’s patented Malware Genetic Sequencing™ technology enables us to identify, analyze, and stop in real time entire viral “families”, as opposed to specific strains or individual variants.
This ability allows reliable, sustained detection and diffusion of a wide range of malware threats. We detect what OTHERS MISS – because we’re not stuck in the perpetual arms race with malware developers, passively looking for their next creation just to figure out how to catch it next time.
We detect BEFORE others can – because we’re not waiting to analyze the new variant as a prerequisite to detection. Derivative strains and variants are just that – derivative.
Our patent-pending family-based detection profiles let us cover the vast majority of derivatives on-the-fly. We detect with the LEAST AMOUNT OF OVERHEAD, both on our team and on your endpoint – because unlike legacy platforms, we don’t need millions of individual static signatures to match the hundreds of thousands of derivative strains and variants created every day.
We detect WHERE others cannot – our Malware Genetics™ and dynamic threat response technology allows ROMAD to sustain detection capability virtually in perpetuity. Isolated industrial deployment scenarios such as SCADA, ICS, and IoT environments where updates are infrequent, yet viral threats prevalent (think Stuxnet model), are a perfect place for ROMAD endpoint threat detection and response capabilities.
We DISRUPT the criminal malware economic model by eliminating the critical time-to-detection gap – the opportunity to monetize the malware before detection is developed by legacy static-signature platforms. We eliminate the economic incentive for malware writers, kit builders, and bot herders, thereby contributing to the elimination of the vast majority of profit-driven malware presently in the wild.
VERVE Industrial Protection
Solving OT cyber security challenges requires the right mix of talent and technology. Verve brings together 25 years of industrial controls engineering and the only vendor-agnostic, OT security management and orchestration platform to deliver turnkey security results for our clients.
Founded originally as Rkneal Engineering in 1994, the firm grew from its early days through a relentless focus on customer service, expanding from one successful customer to the next. Today our legacy lives on in the 1,000+ automation and control system projects we have completed.
The projects range from complete migrations, upgrades, and legacy ICS conversions, to designing, installing, and maintaining a broad range of leading-edge products, software, and systems. Their engineers have worked with every major DCS, PLC, and SCADA system on the planet.
They have worked closely with our clients on their most pressing network and data needs. They have helped them evolve their networks to manage the increasing amount of connectivity necessary to drive increased efficiency and reliability.
We understand how these networks work, their vulnerabilities, and the unique operational characteristics that separate controls networks (operating technology or OT) from IT networks. They always put our customers first, and work hard to maintain our 97% client retention rate..
Awen Collective Ltd
A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society. It is the mission of Awen Collective to reduce the impact of cyber attacks on society’s critical infrastructures.
We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk. Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.
This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Building Automation and Control Systems (BAC / BAS), Robotics and the Internet-of-Things (IoT). .
NextNine is a leader in Operational Technology (OT) security management software for industrial and critical infrastructure, markets that are vulnerable to cyber security attacks and are underserved by conventional enterprise IT solutions. Using NextNine you can have centralized OT security management for your entire SCADA/ICS environment.
Distributed critical infrastructure plants and facilities with proprietary ICS/SCADA networks and devices, paired with the need for external vendors to provide remote maintenance and support, create an ideal target profile for hackers and terrorist attacks. Traditional IT security management solutions were designed to manage standard computing environments and cannot handle the proprietary processes, networks and devices of the ICS/SCADA world.
In contrast, NextNine has over 10 years of leadership in OT security, and has purpose-built its product to deal with these unique challenges. NextNine’s solution is an industrial strength software platform delivering robust, customizable and field proven OT security management.
Top tier critical infrastructure companies along with 5 of the 7 largest industrial vendors have standardized on NextNine. Today, the company has 6000 installations globally in fields such as oil, gas, mining, chemicals, energy, manufacturing, defense and critical infrastructure.
NextNine has been recognized by the White House for its leadership in the efforts to improve critical infrastructure cyber security. NextNine has received ISO/IEC 27001:2013 certification, assuring NextNine’s employees operate a comprehensive security program and manage information security risks effectively.
NextNine’s certificate is issued by the Standards Institution of Israel. The company was founded in 1998, is privately held and headquartered in New York..
LEGIC Identsystems Ltd.
LEGIC is a solution provider and expert for secure contacless identification and IoT connectivity by means of RFID, NFC, and Bluetooth Smart. Our open technology platform covers secure reader and smartcard ICs, the trusted service LEGIC Connect, an SDK for mobile apps as well as key and authorization management for the simple implementation and management of applications.
Our solution is characterized by scalable security, flexibility, simplicity, and investment protection. In the process, we accompany our customers with comprehensive consulting and support in use of the technology.
Leading companies worldwide trust in our technology for employee identification, payment applications, campus cards as well as mobility and hotel solutions. In the future, with our more than 25 years of experience, we will make the identification and communication of people and connected things in everyday life safer and less complicated..
Alpine Security (“Alpine”) is a Service-Disabled Veteran-Owned Small Business providing full-spectrum cybersecurity services and training. Alpine’s goals are to help organizations reduce cybersecurity risk and empower cybersecurity professionals with the skills necessary to effectively assist their organizations.
Alpine’s cybersecurity services include penetration testing, incident response, risk assessments, virtual CISO, and auditing. Alpine’s highly certified and experienced team uses a proven and trusted methodology.
Alpine has experience assessing, testing, and working in complex and high-risk environments, such as offshore drilling platforms, commercial and military aircraft, medical devices (deployed and in-development), blockchain, ICS/SCADA, and embedded systems. Alpine’s medical device penetration division aims to improve patient safety while reducing medical device manufacturer and healthcare provider risk.
Alpine’s cybersecurity training focuses on cybersecurity certifications, such as Certified CISO, CISSP, CEH, Security+, and Advanced Penetration Testing. Alpine Security is headquartered in the Greater St.
Louis / Scott Air Force Base Area.. .
Aleph Tav Technologies Pvt Ltd
Aleph Tav Technologies is a security testing service provider founded in the year 2015 and head-quartered in Chennai, India. We strive to equip companies with knowledge and actionable insights to help them put up a winning fight against threats to information security.
Our vision is to help people and enterprises embrace technology whilst being fully aware of the danger that it can pose to their credibility and business Our security testing professionals build cyber threat profiles for critical infrastructure. Leveraging a combination of automated and manual tools, we perform vulnerability assessment and penetration testing for web and mobile applications, IoT ecosystems, industrial control systems, data assets and enterprise networks.
Our capacity also includes ethical exploiting of systems and applications using lucrative methods, tools and best practices, thereby enabling pervasive threat visibility. We assess security posture with regard to contemporary threats, over and beyond the purview of compliance.
Our flexible, process-centric engagement models and employee behavior conditioning programs have far-reaching benefits in evaluating risk mitigation strategies. In our effort to continually build optimum security standards, we undertake sustained monitoring programs for ISMS and SIEM systems.
We seek to help our clients achieve excellence and preserve business continuity. With a dedicated attack behavior simulation lab for IoT and SCADA, Aleph Tav Technologies systemically analyses susceptibility to real world cyber attack scenarios.
Application Security : Enterprise, Web and Mobile Enterprise Security : Network Vulnerability and Penetration Testing Security Testing for Big data and Cloud Security for IoT SCADA, ICS and HMI security validations Specialized services for “Mergers and Acquisitions” and Legacy Modernization Initiatives Process and Compliance Consulting Digital Forensics. .
Spectra Systems Corporation
Spectra Systems is an established world leader in providing technology for secure transactions, from banknotes and products, to electronic gaming. Our high-speed, machine-readable banknote authentication technology is utilized by many central banks to prevent sophisticated counterfeiting of their currency.
Our complete solutions include engineered materials, reliable high speed sensors, and quality control equipment. We manufacture our products under secure conditions and build our own equipment to meet our customers’ needs.
Spectra has recently expanded its authentication of secure transactions beyond physical banknotes with its secure internal control systems (ICS) software platforms and is an established security provider for the worldwide gaming industry. Our ICS systems provide methods for fraud detection, money laundering, match fixing and statistical analysis and have many existing parallel applications used by the securities exchange industry.
Spectra is building on its reputation as a supplier of technologically advanced and high reliability sensors by developing breakthrough banknote fitness products which include porosity sensors and an innovative technology for cleaning banknotes to reduce central bank replacement costs. This banknote cleaning technology (Aeris™), is currently being tested by several world central banks..
Established in 1983, Microexpert are an independent data security consultancy and are leading experts in the application of cryptography. We can provide consultancy, solutions and service based tools for protecting digital assets using cryptographic techniques for information security, payment systems security, sensitive data and privacy security and control systems security.
With digital data being the core of our personal and business transactions it is so easy to forget that data represents assets in a digital form with business or personal value. This has been shown of late with cyber-attacks operating worldwide often with tragic consequences for not only the owners of data but also impacting on organisations that store and process financial and personal data.
Microexpert can show you how to incorporate the best security practices in your systems by providing solutions for: Information security GDPR Compliance Sensitive data privacy Electronic payments and transactions Digital currencies and blockchain applications Internet Of Things (IoT) Industrial Control Systems (ICS) Microexpert can show you how to safeguard company encryption keys by providing cryptographic management and monitoring tools for the following working applications: HSM solutions Access Control Databases Communications Time Stamping Hard Drives Digital Signatures Payments. .
Critical Intelligence provides authoritative Cyber Situational Awareness and Threat Intelligence solutions for Industrial Control System (ICS) Owner/Operators, Vendors and Government stakeholders. They tracked the ICS threat environment for years before Stuxnet.
They’ve kicked-off law enforcement investigations, and notified their clients of online substations and wind farms.They’ve identified planned protests and analyzed more than 1,000 ICS-specific vulnerabilities. Critical Intelligence enables decisions that preserve the safety and reliability of the world’s infrastructures..
Aspect Engineering Group
Aspect Engineering Group provides end-to-end automation and integration consulting services. It offers control systems automation and programming services to petroleum companies.
Aspect Engineering Group include control systems engineering which comprises advanced process control, process automation, automation integration, and control system migration. Its database design and integration services consist of database capacity optimization, build and implementation services, database monitoring, and incident management.
Aspect Engineering Group’s client applications include developing and delivering software systems and maintaining source control, issue tracking, and automated build system. Its project management consist of control costs and manage scheduling and subcontractors.
Aspect Engineering Group’s ICS cyber security comprises secure industrial control systems and risk assessments. Jeff Jones founded it in 2000, with its headquarters in Bakersfield in California..
Founded in 2013, ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants. Headquartered in Jerusalem, Israel, ICS² was launched by a veteran team of control system experts with broad experience working with Big Data and large scale communication applications.
Their team combines mathematicians, computer scientists, power plant system designers and process control experts. Their unique mix of basic science and process knowledge is a key advantage in creating a unique protection system for industrial control processes.
The core ICS² team emerged from BrightSource Energy’s software and industrial process departments. These professionals have evolved between the IT world and the OT world of embedded systems, complex wireless solutions, and with various industrial control systems (DCS, PLC, HMI, MES, SCADA).
Simultaneously, they pioneered breakthroughs in complex computer science algorithms including computer vision, online and offline optimization algorithms, machine learning and complex Big Data handling.. .
The Derezzed LLC. mission is to use advanced, cutting edge technology in creative ways (thinking “outside of the box”) to solve unique and perplexing problems.
This is exemplified in our flagship products, PhysicsGENvr and ThreatGENvr Industrial Cyber Range. ThreatGENvr uses computer gaming engine technology, leveraged by the real-world physics simulation capabilities of PhysicsGENvr, to create realistic, immersive 3D and virtual reality environments for simulations and problem solving in ways that would be too difficult, if not impossible, in real life.
For example, ThreatGENvr can simulate all of the physical field equipment of an entire industrial environment such as a refinery, connect to real-world digital equipment such as PLCs (Programmable Logic Controllers), and accurately replicate actual real-world industrial processes. Such simulations allow for use cases like safety testing and training, security testing and training, penetration testing, impact analysis, and many more to a degree of realism, accuracy, and scale that could never be accomplished in a small physical lab, or to the degree of safety that can’t be accomplished on production systems..
HypaSec offers expert advice, incident response management, lecturing, training in IT and ICS security, penetration testing and writing services in security. Lead by Chris Kubecka, CEO and Security Reseacher.
With >20 years of professional experience including the US Air Force Space Command, private sector with Llyods TSB, Danone Saudi Aramco and Aramco Overseas; as well as, public sector.. .
Mathan provides vulnerability assessment and penetration testing services for organizations. As a smaller organization, they have to hang their hat on quality service.
Their Cyber Security Engineers have more than 20 years of experience in Vulnerability Assessment and Penetration testing of Enterprise, ICS, and SCADA systems in DoD (Department of Defense), Government, and Commercial environments. They are a Special Disabled Veteran Owned Small Business.
They provide their customers with thorough identification of potential vulnerabilities and assist in eliciting potential solutions and/or remediation actions.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.