Saturday, December 7, 2019
  • Ransomware at Colorado IT Provider Affects 100+ Dental Offices
  • Social Engineers are No Match for Artificial Intelligence
  • The Changing Landscape of Customer Acquisition, Engagement and Retention in 2020
  • Going After the Good Guys: The Government’s Ransomware Identity Crisis
  • Automate User Deprovisioning

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Protecting Your Industrial Operations with Top-Floor to Shop-Floor Visibility

Protecting Your Industrial Operations with Top-Floor to Shop-Floor Visibility

by Tripwire Guest Authors on October 1, 2018

I am extremely pleased today to announce Claroty’s integration into Tripwire’s ICS security capabilities. The integration of our respective technologies, based on a shared vision of how the security landscape is evolving, addresses a fast-growing need within industrial enterprises for top-floor to shop-floor visibility across both business and operational environments.

After years of neglect, increased risk awareness among Boards and C-level execs has directed more attention, and action, to addressing poorly protected and vulnerable industrial control system (ICS) networks. And it’s not just the traditional industrial and manufacturing sectors that are at risk; virtually every enterprise operates some kind of ICS network (HVAC or elevators in any modern office building, for example).

Security teams, who must now manage an expanded risk landscape across both the IT and OT environments, are increasingly looking for solutions that provide comprehensive visibility and monitoring of all networks and endpoints across the enterprise.

Belden and its Tripwire brand have delivered best-of-breed endpoint cybersecurity solutions for years. Now, combined with Claroty’s world-class network monitoring and anomaly detection the new Tripwire Industrial Visibility solution provides extreme visibility, continuous threat and vulnerability monitoring and deep insights across IP and non-IP network segments into the deepest reaches of the OT environment including programmable logic controllers (PLCs), remote terminal units (RTUs) and distributed control systems (DCS).

This extended visibility will help security teams more effectively identify risk across the enterprise, prioritize remediation and respond more quickly and efficiently during a security incident. This has become increasingly important as we see recent threats such as WannaCry and NotPetya spilling over from the IT to the OT environment, causing exponentially greater damage and disruption to industrial enterprises.

In addition to the added visibility, Claroty’s new virtual zones capability helps customers dramatically improve their security posture and simplify the difficult task of (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/ics-security/protecting-industrial-operations/

October 1, 2018October 1, 2018 Tripwire Guest Authors Belden, Claroty, ICS, ICS Security
  • ← Security is Everyone’s Responsibility in the Organization
  • National Cybersecurity Awareness Month Sweepstakes →
Featured Blog

Enzoic

Automate Password Policy & NIST Password Guidelines

Enzoic

Old vs. New Methods for Employee Password Hardening

Enzoic

Shop Safely This Cyber Monday

Enzoic

Disney and the Password Reuse Problem

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns
Don’t (Geo)Fence Me In: Courts Order Google To Give Up Location Data
Quantum Computing Is Coming: Are You Cyber Ready?
Are Passwords Now Passé?
Learning From Health Care’s IoT Security Strategy
Biggest 2019 data breaches: Some of the worst of the worst
The Ultimate Hacker Movies List for 2020
Cliff Notes to 5 Studies about the State of Cybersecurity in Healthcare
Old vs. New Methods for Employee Password Hardening
Rogue Staff Member at Leading Cybersecurity Company Leaks Customer Data

Upcoming Webinars

Mon 09

Cloud Security – Keeping Serverless Data Safe

December 9 @ 11:00 am - 12:00 pm
Tue 10

Securing Mobile Apps, From the Inside Out

December 10 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Open Source Security: Weighing the Pros and Cons

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Learning From Health Care’s IoT Security Strategy
Cybersecurity Industry Spotlight IoT & ICS Security Security Boulevard (Original) 

Learning From Health Care’s IoT Security Strategy

December 6, 2019 Mike Nelson | 1 day ago 0
Why You Need PAM and VPAM in 2020
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Why You Need PAM and VPAM in 2020

December 5, 2019 Tony Howlett | 2 days ago 0
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Are Passwords Now Passé?

December 4, 2019 Ori Eisen | 3 days ago 0

Top Stories

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)
Cybersecurity Endpoint Featured Mobile Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

December 6, 2019 Richi Jennings | 1 day ago 0
StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns
Cybersecurity Data Security Featured Malware Mobile Security News Security Awareness Security Boulevard (Original) Spotlight 

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

December 3, 2019 Richi Jennings | 4 days ago 0
TrueDialog Leaks 600GB of Personal Data, Affecting Millions
Cloud Security Cybersecurity Data Security Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight 

TrueDialog Leaks 600GB of Personal Data, Affecting Millions

December 2, 2019 Richi Jennings | Dec 02 0

Security Humor

via    the comic delivery system monikered  Randall Munroe  at   XKCD  !

XKCD, Is It Christmas?

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2019 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.