IoT
12/14/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CyberX Adds Secure Remote Access Integration for Critical Industrial Networks

New privileged account security integration reduces risk of unauthorized access to control networks.

BOSTON– CyberX, provider of the most widely-deployed industrial cybersecurity platform for continuously reducing industrial control system (ICS) risk, today announced a new technology integration with CyberArk, the global leader in privileged account security, to provide secure remote access for critical industrial networks. CyberX is also a new member of the C3 Alliance, CyberArk’s global technology partner program.

ICS security is rapidly becoming a top-down priority for industrial and critical infrastructure organizations worldwide. Recent targeted attacks on energy companies such as Dragonfly 2.0 demonstrate that adversaries are seeking to access industrial networks using credentials stolen from privileged users such as control engineers and third-party maintenance personnel. This well-known approach — leveraging trusted remote connections such as VPNs to bypass network perimeter controls — was also used in the 2015 Ukrainian grid attack.

CyberX is the market leader in ICS and IIoT security with deployments across energy & utilities, oil & gas, manufacturing, pharmaceuticals, chemicals, nuclear and water. Since 2013, the company has leveraged its passive monitoring and proprietary Network Traffic Analysis (NTA) algorithms to assess ICS risk for more than 375 production ICS networks worldwide. Purpose-built for ICS security and developed by military cyber experts with nation-state experience defending critical infrastructure, the CyberX platform delivers continuous ICS threat monitoring and asset discovery, ICS threat intelligence, and non-invasive risk and vulnerability assessments.

The CyberArk solution offers a wide range of capabilities for securing privileged credentials and controlling remote access to critical assets such as SCADA workstations and Human Machine Interfaces (HMIs). The integration of CyberX’s continuous ICS monitoring platform with the CyberArk Privileged Account Security Solution enables industrial organizations to:

·         Receive real-time alerts whenever CyberX detects remote sessions on the ICS network that were not authorized by the CyberArk solution. Additionally, the CyberX platform incorporates ICS-specific behavioral analytics and self-learning to immediately detect anomalous behavior indicating a potential breach of the OT network

·         Continuously monitor and audit privileged user sessions in the CyberX console, including which ICS devices are being accessed and whether the session is being recorded by CyberArk

·         Perform incident response, threat hunting and threat modeling around remote access. To enable rapid breach response, SOC analysts can now query the CyberX event timeline to identify all remote sessions based on forensic details such as which remote access protocols were used (SSH, RDP, etc.) and whether sessions were authorized by CyberArk. Additionally, they can leverage CyberX’s exclusive automated threat modeling capability to proactively identify and secure multi-step attack chains that incorporate remote access connections to compromise critical assets

“Our mission is to reduce ICS risk by providing our customers with deep and continuous real-time visibility into all activity, threats and assets on their ICS networks,” said Omer Schneider, CEO and co-founder of CyberX. “By tightly integrating the CyberX platform with the market-leading CyberArk Privileged Account Security Solution, we’re significantly enhancing that visibility to reduce risk from one of the top attack vectors targeting industrial environments today.”

The CyberArk Privileged Account Security Solution is a complete solution to protect, monitor, alert and respond to privileged account-related risk. The proven platform offers a wide range of capabilities including the ability to secure and control access to privileged credentials and secrets based on policy; isolate, monitor and record privileged sessions; respond to anomalous privileged activity and halt in-progress attacks, and enforce least-privileged policies across all endpoints.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: camera, camera everywhere, not a single news to rely on
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16873
PUBLISHED: 2018-12-14
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, b...
CVE-2018-16874
PUBLISHED: 2018-12-14
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in mod...
CVE-2018-16875
PUBLISHED: 2018-12-14
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are ...
CVE-2018-14623
PUBLISHED: 2018-12-14
A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulne...
CVE-2018-18093
PUBLISHED: 2018-12-14
Improper file permissions in the installer for Intel VTune Amplifier 2018 Update 3 and before may allow unprivileged user to potentially gain privileged access via local access.