Select Page

Products

Anomaly and Vulnerability Detection System (iSID)

Automated platform for monitoring, threat detection, and anomaly detection in ICS OT networks

Know the cybersecurity status of your infrastructure in real time

  • Real passive analysis of industrial network traffic
  • Anomaly detection in communication behavior
  • Calculation of compliance with IEC 62443

iSID, the Industrial Cybersecurity Awareness platform, monitors OT networks in a distributed, non-intrusive manner to detect potential threats that may affect their proper functioning. It also creates a pattern of communications and anomalous behavior of the equipment.

It has several mechanisms to create the model: visibility of IT and OT devices, protocols, sessions, attack detection, policy monitoring, and validation of operating parameters.

Objectives and benefits

iSID enables non-intrusive monitoring of traffic circulating through a specific ICS OT network to detect changes in its topology or behavior:

  • Network visibility: Using passive network scanning techniques, iSID creates a visual model for all devices, protocols, and sessions, generating alerts in case of changes.
  • Cybersecurity threats: the monitoring tool detects general and specific threats to ICS OT networks.
  • Anomaly detection: iSID creates a network behavior model using multiple parameters to detect changes that may indicate malicious actions.
  • Policy monitoring: defines policies for each network link to validate specific commands that may affect the proper functioning of the process.

Key features

Self-learning

Generation of the profile and behavior model of the networks, including devices and connections.

PLC Monitoring

Continuous monitoring of changes in PLCs and other network equipment.

Non-intrusive analysis

DPI analysis of communication flows using PortMirror, SPAN ports, or iSAP probes. Without affecting operation traffic.

Attack vector analysis

Detection of attack vectors based on detected cybersecurity vulnerabilities and device interoperability.

Local or central deployment

Modular architecture of multiple iSIDs with centralized management with iCEN.

Prepared for MSSP

Centralized management with iCEN, prepared to be used in SOC.

Architecture

Would you like to learn more?

Our solutions and products are sophisticated tools that demand broad expertise across various approaches and fields.
You can rely on us.

Products
Anomaly and Vulnerability Detection System (iSID)

Get in Touch with an Expert

Fill in your information and we’ll contact you.