We solve the problem of utilities operational networks getting hacked
We have two lines of products, two solutions. One is a software which runs offline called Intrusion Detection System. It detects any attempts to control or harm the network. The second product is a gateway. It’s a hardware that is based online and sits inside the remote sites and monitors the different devices there. We have an end-to-end solution. We have a central software that looks at the entire network itself and a hardware that sits at the remote sites of the network.
Check Point, Claroty, Next Defense, CyberX, Security Matters, and many more.
We were the first in the market. We’ve been around since 2009 and most of the other companies are much younger than us, so we have a better visibility of the market. We have a better install base of the market and a better understanding of the market. The combination of hardware and software is something exclusive to just our company which gives us an edge over other companies. Altogether, it’s quite a comprehensive solution.
The people. IT people are well versed in regular network solutions. When it comes to OT networks, they are controlled by the SCADA people. Their main concern is that the systems run and provide the utilities to the general public. In these cases there is sometimes conflict between the IT people and the OT people. It’s difficult to overcome but a top-down approach, whereby executives force the OT people to deploy solutions might work.
- Mount Cyber Staff reviewed 2 years ago
- last edited 2 years ago
Researchers at #israeli #CyberSecurity company @RadiflowSec uncover what’s believed to be first case of major industrial control system network infected with cryptocurrency-mining malware. Most likely not the last neither! #thesource #StartUpNation .
- You must login to post comments