Products
Anomaly and Vulnerability Detection System (iSID)
Automated platform for monitoring, threat detection, and anomaly detection in ICS OT networks
Know the cybersecurity status of your infrastructure in real time
- Real passive analysis of industrial network traffic
- Anomaly detection in communication behavior
- Calculation of compliance with IEC 62443
iSID, the Industrial Cybersecurity Awareness platform, monitors OT networks in a distributed, non-intrusive manner to detect potential threats that may affect their proper functioning. It also creates a pattern of communications and anomalous behavior of the equipment.
It has several mechanisms to create the model: visibility of IT and OT devices, protocols, sessions, attack detection, policy monitoring, and validation of operating parameters.
Objectives and benefits
iSID enables non-intrusive monitoring of traffic circulating through a specific ICS OT network to detect changes in its topology or behavior:
- Network visibility: Using passive network scanning techniques, iSID creates a visual model for all devices, protocols, and sessions, generating alerts in case of changes.
- Cybersecurity threats: the monitoring tool detects general and specific threats to ICS OT networks.
- Anomaly detection: iSID creates a network behavior model using multiple parameters to detect changes that may indicate malicious actions.
- Policy monitoring: defines policies for each network link to validate specific commands that may affect the proper functioning of the process.
Key features
Self-learning
Generation of the profile and behavior model of the networks, including devices and connections.
PLC Monitoring
Continuous monitoring of changes in PLCs and other network equipment.
Non-intrusive analysis
DPI analysis of communication flows using PortMirror, SPAN ports, or iSAP probes. Without affecting operation traffic.
Attack vector analysis
Detection of attack vectors based on detected cybersecurity vulnerabilities and device interoperability.
Local or central deployment
Modular architecture of multiple iSIDs with centralized management with iCEN.
Prepared for MSSP
Centralized management with iCEN, prepared to be used in SOC.
Architecture

Datasheets & videos
Get in Touch with an Expert
Fill in your information and we’ll contact you.