Skip to main content

 

RobustD

CPS intrusion detection solution which monitors sensor and actuator data at ICS con- trollers + OT host and detects intrusion
•    Reduces cyber security risk
•    Enhances OT + ICS security mitigation
•    Reduces control subverting risk

RobustD

System configuration of the proposed solution

RobustD deployed at OT layer and integrated with controller over Modbus TCP + histo- rian. Acquires data, calculates anomaly / alarm score for newly generated measurements and detects intrusion.

Features

Intrusion detection at OT and ICS layers, ML based, May detect zero-day attacks, Robust and resistant to outliers.

 

FileD

File diagnosis solution which provides security against malicious files by analyzing and quarantining
•    Aids risk management
•    Reduces ransomware and other malware risks
•    Enhances OT + ICS + IT security

FileD


System configuration of the proposed solution
 

FileD can be deployed in the customer’s network as a service. Users can upload their files received and get them analyzed before use.

Features

ML based, Maintains hash of submitted files and Repo of identified malicious files to speed up future analysis, Currently analyzes PE, ELF, PDF, APK, and JS, Unified platform that performs static, dynamic and memory forensics, accuracy Up to 99%, packed and obfuscated malicious file detection.

 

 

TrapD

Honeypot solutions which provide additional security protection designed to trap a hacker into a decoy system thus unknowingly revealing it’s modus operandi
•    Provides in house threat intelligence collection mechanism
•    Enhances OT + ICS + IT security

TrapD

System configuration of the proposed solution

Deployed within the network, TrapD acts like an actual system, waits for requests and responds accordingly, Keeps malicious actor engaged by serving several vulnerabilities incorporated intentionally.

Features

Flexible deployment either at intranet or on the Internet, Continuous monitoring, Near real time notification, Scalable up to 36 subnets 108 decoys 200 concurrent clients.

 

BinD

A Network Intrusion Detection System which monitors the network and detects intrusion by malicious actors and bots in the network.

  • Reduces cyber security risk
  • Enhances network security
  • Limits generation of attacks from the premises like DDoS, spam, phishing, pass- word sniffing, etc.

 

BinD

System configuration of the proposed solution

BinD is a network-connected solution. It acquires and analyzes network traffic and detects malicious actors + identifies bots.

Features

Bot-net Detection, BinD classifies botnets up to an overall accuracy of 99.85%. NIDS works for Modbus, CIP, IEC61850, IEC60870-5-104 and other industrial protocols.

 

TiS

A threat intelligence system which provides near real time visualization of information about threats and threat actors
•    Enhances cyber security risk mitigation
•    Provides full visibility, situational awareness and actionable threat intelligence

TIS

System configuration of the proposed solution

Integrates with Network connected critical application servers. Continuously moni- tors the logs of an integrated application server, analyzes the logs, classifies and notifies the end-user.

Features

Detects various web borne threats with an accuracy up to 99%, ML based, Continuous monitoring, Near real time notification.